Advances in networking technology have made Distributed Denial of Service (DDoS) attacks a real danger to today's networks. Using logical reasoning, the network flow circumstances may be classified as an attack or...
详细信息
Cryptocurrency mining data centers consume 100-200 times more energy than conventional office areas annually. Regulating power consumption, cooling mechanisms, and thermal control performance is crucial to creating a ...
详细信息
Federated Learning (FL) has gained prominence for collaborative training across multiple devices without data sharing. However, traditional FL overlooks two crucial aspects: collaborative fairness and privacy protecti...
详细信息
As the automotive industry continues to evolve towards connected and autonomous vehicles, the need for robust and secure communication channels between vehicles and emergency services becomes paramount. Access control...
详细信息
The escalating demands of data processing applications have propelled Field Programmable Gate Array (FPGA)s into the forefront of programmable accelerators in modern computing systems. Design automation or computer-ai...
详细信息
Spectral clustering is widely used due to its effectiveness in handling nonlinear data, but its performance is limited by high computational complexity when processing large-scale datasets. To address this issue, this...
详细信息
In many nations, malnutrition is the primary cause of death for children under five. An inventive way to handle the problem of hunger in a non-invasive and effective way is through the use of deep learning in image pr...
详细信息
The swift rise in urbanization has resulted in growing difficulties with garbage management, calling for creative approaches to lessen its negative effects on the environment. The system accomplishes real-time garbage...
详细信息
This study examines the prediction of diseases through the analysis of 1,200 symptom narratives across 24 different diseases. Employing Huggingface's 'bert-base-cased' transformer model, renowned for its a...
详细信息
Security is a primary concern in communication for reliable transfer ofinformation between the authenticated members, which becomes more complexin a network of Internet of Things (IoT). To provide security for group c...
详细信息
Security is a primary concern in communication for reliable transfer ofinformation between the authenticated members, which becomes more complexin a network of Internet of Things (IoT). To provide security for group communication a key management scheme incorporating Bilinear pairing technique withMulticast and Unicast key management protocol (BMU-IOT) for decentralizednetworks has been proposed. The first part of the proposed work is to dividethe network into clusters where sensors are connected to and is administered bycluster head. Each sensor securely shares its secret keys with the cluster headusing unicast. Based on these decryption keys, the cluster head generates a common encryption key using bilinear pairing. Any sensor in the subgroup candecrypt the message, which is encrypted by the common encryption key. Theremaining part focuses to reduce communication, computation and storage costsof the proposed framework and the resilience against various attacks. The implementation is carried out and results are compared with the existing schemes thathave given considerably better results. Thus, the lightweight devices of IoT canprovide efficiency and security by reducing their overhead in terms of complexity.
暂无评论