A novel medical internet of things perception system based on visual image encryption and intrusion detection

被引:0
作者
Aiying Guo
Meihua Xu
Feng Ran
Haiyong Wang
机构
[1] Shanghai University School of Mechatronic Engineering and Automation,Department of Mechatronic Engineering
[2] Shanxi Light Industry College of Vocational and Technical,undefined
[3] Microelectronics Research and Development Center,undefined
[4] Shanghai University,undefined
[5] Shanghai Ruchu Edrive Company,undefined
来源
Cluster Computing | 2019年 / 22卷
关键词
Internet of Things (IoT); Smart city; Wireless communication protocol; Information security; Data mining;
D O I
暂无
中图分类号
学科分类号
摘要
Smart cities are the emerging topics in the recent decade with advancements in science and technology especially in the areas of communication technologies. Concept of smart cities depicts the inteconnectivity of physical objects to provide transparency in communication between the physical components or objects. However, implementation of a smart city using Internet of Things (IoT) which is the backbone architecture is affected by several attacks in the wireless communication domain during communication of information between the components as well as cyber-attacks which necessiate the need for the intrusion detection mechanism to prevent any illegeal loss data. This research paper addresses these security issues by implementing the IoT architecture and systematically analysing the demands in security aspects as well as justifying the results with experimentations conducted in a simulated smart city environment.
引用
收藏
页码:13405 / 13413
页数:8
相关论文
共 63 条
  • [1] Cirani S(2013)Enforcing security mechanisms in the IP based internet of things: an algorithmic overview Int. J. Sens. 6 197-226
  • [2] Ferrari G(2016)Hardware implementation of Blowfish algorithm for the secure data transmission in internet of things Procedia. technol. 1 472-482
  • [3] Veltri L(2014)From data clouds: enabling community-based data-centric services over the internet of things IEEE Int. Things J. 2 196-201
  • [4] Suresh M(2012)Superiority of blowfish algorithm Int. J. Adv. Res. Comput. Sci. Softw. Eng. 9 289-306
  • [5] Neema M(2015)A review and comparative analysis of various encryption algorithms Int. J. Secur. Appl. 3 1087-1097
  • [6] Yue LH(2014)A comparative analysis on symmetric key encryption algorithms Int. J. Adv. Res. Comput. Eng. Technol. 13 48-55
  • [7] Guo L(2009)Building the internet of things using RFID: the RFID ecosystem experience IEEE Internet Comput. 16 414-454
  • [8] Li R(2013)Context aware computing for the Internet of Things: a survey IEEE Commun. Surv 52 97-105
  • [9] Asaeda H(2014)From `smart objects’ to `social objects’: the next evolutionary step of the internet of things IEEE Commun. Mag. 1 206-215
  • [10] Fang Y(2014)The cluster between internet of things and social networks: review and research challenges IEEE Internet Things J. 1 265-275