Please use this identifier to cite or link to this item:
http://hdl.handle.net/123456789/982
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kuamr, Santosh | - |
dc.contributor.author | Yadav, Rajeev | - |
dc.contributor.author | Kaushik, Priyanka | - |
dc.contributor.author | Babu, S B G Tialk | - |
dc.contributor.author | Dubey, Rajesh Kumar | - |
dc.contributor.author | Subramanian, Muthukumar | - |
dc.date.accessioned | 2023-04-25T13:59:46Z | - |
dc.date.available | 2023-04-25T13:59:46Z | - |
dc.date.issued | 2022 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/982 | - |
dc.description.abstract | This research work is conducted to make the analysis of digital technology is one of the most admired and effective technologies that has been applied in the global context for faster data management. Starting from business management to connectivity, everywhere the application of IoT and digital technology is undeniable. Besides the advancement of the data management, cyber security is also important to prevent the data stealing or accessing from the unauthorized data. In this context the IoT security technology focusing on the safeguarding the IoT devices connected with internet. Different technologies are taken under the consideration for developing the IoT based cyber security such as Device authentication, Secure on boarding, data encryption and creation of the bootstrap server. All of these technologies are effective to its ground for protecting the digital data. In order to prevent cyber threats and hacking activities like SQL injection, Phishing, and DoS, this research paper has proposed a newer technique of the encryption process by using the python codes and also shown the difference between typical conventional system and proposed system for understanding both the system in a better way. | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal of Electrical and Electronics Research | en_US |
dc.subject | Interdisciplinary, Cyber security, Theory of computation, Internet of Things (IoT), E-threat. | en_US |
dc.title | Effective cyber security using IoT to prevent E-threats and hacking during covid-19 | en_US |
dc.type | Article | en_US |
Appears in Collections: | School of Engineering & Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Effective Cyber Security Using IoT to Prevent E-Threats and Hacking During Covid-19.pdf | 994.24 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.