[go: up one dir, main page]

Mahadik et al., 2024 - Google Patents

Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues

Mahadik et al., 2024

Document ID
4598214048361626969
Author
Mahadik S
Pawar P
Muthalagu R
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

The HetIoT is a new emergent technology widely used to offer QoS to applications such as health monitoring systems, agriculture 4.0, traffic monitoring, industry 4.0, and civil defense, to name a few. These applications are in high demand as the world is heading towards 6G …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication
    • G06F15/173Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star, snowflake
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30964Querying
    • G06F17/30979Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme

Similar Documents

Publication Publication Date Title
Khanam et al. A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things
Mallick et al. Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments
Lone et al. A comprehensive study on cybersecurity challenges and opportunities in the IoT world
Lakshminarayana et al. Securing the IoT application layer from an MQTT protocol perspective: Challenges and research prospects
Fei et al. A systematic review of IoT security: Research potential, challenges, and future directions
Srivastava et al. Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects
Anthi et al. A supervised intrusion detection system for smart home IoT devices
Fereidouni et al. IoT and man‐in‐the‐middle attacks
Özalp et al. Layer-based examination of cyber-attacks in IoT
Humayun et al. Industry 4.0 and cyber security issues and challenges
Gupta et al. Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks
Illy et al. ML-based IDPS enhancement with complementary features for home IoT networks
Laghari et al. Securing MQTT ecosystem: Exploring vulnerabilities, mitigations, and future trajectories
Kumar et al. Review on security and privacy concerns in Internet of Things
Tabassum et al. Security Framework for IOT devices against Cyber-attacks
Mahadik et al. Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues
Saeed et al. Data-driven techniques and security issues in wireless networks
Cecílio et al. Security issues in industrial Internet-of-Things: Threats, attacks and solutions
Khalid et al. Study of security and privacy issues in internet of things
Wijesekara et al. Intrusion Detection Using Blockchain in Software-Defined Networking: A Literature Review.
Gupta et al. Security challenges in adopting internet of things for smart network
Kumar et al. Advance comprehensive analysis for Zigbee network-based IoT system security
Sefati et al. A comprehensive survey of cybersecurity techniques based on quality of service (QoS) on the Internet of Things (IoT)
Patel et al. Security trends in internet-of-things for ambient assistive living: a review
Patel et al. Security issues, attacks and countermeasures in layered IoT ecosystem