Mostrar el registro sencillo del ítem

dc.contributor.authorXin, Qin
dc.contributor.authorGonzález-Crespo, Rubén
dc.contributor.authorMontenegro-Marin, Carlos Enrique
dc.contributor.authorGarcía Díaz, Vicente
dc.contributor.authorAlazab, Mamoun
dc.date2023
dc.date.accessioned2022-10-19T12:29:27Z
dc.date.available2022-10-19T12:29:27Z
dc.identifier.citationXin, Q., Crespo, R.G., Montenegro-Marin, C.E. et al. Decentralized security framework for future IoT end-to-end connectivity. Ann Oper Res (2022). https://doi.org/10.1007/s10479-021-04380-x
dc.identifier.issn0254-5330
dc.identifier.urihttps://reunir.unir.net/handle/123456789/13670
dc.description.abstractThe emergence of the Internet of Things (IoT) has given digital communications a range of interconnected functionalities. The IoT is an intelligent technology between the real and the digital world. An IoT end-to-end solution comprises components such as Component for User Access: Mobile Application or Web Application. IoT Gateway. Cloud Infrastructure. The upcoming technology of contacts and service delivery in IoT is comprehensive and open. The broad IoT platform is provided by a network of sensors and separate nodes. IoT framework is adopted for implementation and assistance by the intelligent computing, storing information, and characteristics of the devices. Safety is a big concern in such an open atmosphere and needs to be dealt with the decentralization. A security framework for future IoT end-to-end connectivity (SF-FIoTC) is proposed. Decentralized and scalable safety architecture for future IoT is developed. This system uses the benefits of intelligent computation and tree-based hash systems to ensure device-to-device privacy and to need authorization. The tree-based hashing can be used for the authentication of demands. The system's decentralized safety feature offers safety at the machine level and ensures greater confidentiality and communication systems reliability. In terms of classification accuracy, transmission loss, delivery ratio, and latency, the operational study of the suggested security architecture can be analyzed, and the performance is excellent in all cases.es_ES
dc.language.isoenges_ES
dc.publisherAnnals of Operations Researches_ES
dc.relation.urihttps://link.springer.com/article/10.1007/s10479-021-04380-xes_ES
dc.rightsopenAccesses_ES
dc.subjectinternet of thingses_ES
dc.subjectend-to-end securityes_ES
dc.subjectauthorizationes_ES
dc.subjectwireless transmissiones_ES
dc.subjectJCRes_ES
dc.subjectScopuses_ES
dc.titleDecentralized security framework for future IoT end-to-end connectivityes_ES
dc.typeArticulo Revista Indexadaes_ES
reunir.tag~ARIes_ES
dc.identifier.doihttps://doi.org/10.1007/s10479-021-04380-x


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem