Password Protection Using Gӧdelization Technique for IOT Device

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SpEED-IoT: Spectrum aware energy efficient routing for device-to-device IoT communication

In order to meet the growing demands for high-throughput, cost-effective, and energy efficient solution for the emerging device-to-device (D2D) based Internet of Things (IoT) communication, Dynamic Spectrum Access (DSA) and sharing based protocols have been proposed. However, due to the temporal and spatial transience of spectrum utilization by licensed incumbents, optimal spectrum resource man...

متن کامل

One Time Pad Password Protection: Using T.E.C. Steganography and Secure Password Transmission Protocols

A while ago, I developed what I called an encryption method. The most favorable of reviews did not see a method but a collection of techniques. (The use of base Fibonacci being the most interesting.) Be that as it may, whatever process is being used, is described in the original paper, “Windtalking Computers” [ZIR01]. This paper is about the steganographic method described in ZIR01, the cryptan...

متن کامل

Dynamic Data Binding Protocol between IoT Medical Device and IoT Medical Service for Mobile Healthcare

In this paper, the author suggests a binding protocol which enables users to use public medical devices as if they are their own medical devices through IoT Healthcare. Binding protocol provides customized real-time transmission function enabling interwork between mobile phones, medical devices and monitoring services. In particular, the author defines a protocol to support streaming date trans...

متن کامل

Taking Control of Household IoT Device Privacy

Household IoT devices are intended to collect information in the home, and interact with each other, to create powerful new applications that support our day-to-day activities. For example, a smart fridge detects when certain groceries are running out, and triggers a shopping console to order fresh supplies. Technical solutions can ascertain that the data used for such functionality are minimiz...

متن کامل

Prover and Verifier Based Password Protection: PVBPP

In today's world password are mostly used for authentication. This makes them prone to various kinds of attacks like dictionary attacks. A dictionary attack is a method of breaking the password by systematically entering every word in a dictionary as a password. This attack leads to an overload on the server leading to denial of service attack. This paper presents a protocol to reduce the rate ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology

سال: 2017

ISSN: 2321-9653

DOI: 10.22214/ijraset.2017.10254