Password Protection Using Gӧdelization Technique for IOT Device
نویسندگان
چکیده
منابع مشابه
SpEED-IoT: Spectrum aware energy efficient routing for device-to-device IoT communication
In order to meet the growing demands for high-throughput, cost-effective, and energy efficient solution for the emerging device-to-device (D2D) based Internet of Things (IoT) communication, Dynamic Spectrum Access (DSA) and sharing based protocols have been proposed. However, due to the temporal and spatial transience of spectrum utilization by licensed incumbents, optimal spectrum resource man...
متن کاملOne Time Pad Password Protection: Using T.E.C. Steganography and Secure Password Transmission Protocols
A while ago, I developed what I called an encryption method. The most favorable of reviews did not see a method but a collection of techniques. (The use of base Fibonacci being the most interesting.) Be that as it may, whatever process is being used, is described in the original paper, “Windtalking Computers” [ZIR01]. This paper is about the steganographic method described in ZIR01, the cryptan...
متن کاملDynamic Data Binding Protocol between IoT Medical Device and IoT Medical Service for Mobile Healthcare
In this paper, the author suggests a binding protocol which enables users to use public medical devices as if they are their own medical devices through IoT Healthcare. Binding protocol provides customized real-time transmission function enabling interwork between mobile phones, medical devices and monitoring services. In particular, the author defines a protocol to support streaming date trans...
متن کاملTaking Control of Household IoT Device Privacy
Household IoT devices are intended to collect information in the home, and interact with each other, to create powerful new applications that support our day-to-day activities. For example, a smart fridge detects when certain groceries are running out, and triggers a shopping console to order fresh supplies. Technical solutions can ascertain that the data used for such functionality are minimiz...
متن کاملProver and Verifier Based Password Protection: PVBPP
In today's world password are mostly used for authentication. This makes them prone to various kinds of attacks like dictionary attacks. A dictionary attack is a method of breaking the password by systematically entering every word in a dictionary as a password. This attack leads to an overload on the server leading to denial of service attack. This paper presents a protocol to reduce the rate ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2017
ISSN: 2321-9653
DOI: 10.22214/ijraset.2017.10254