User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 18
 Downloands 2
A Novel Blockchain-Based Lightweight Encryption Technique in Fog Based IoT for Personal Healthcare Data Application
2023
Journal:  
International Journal of Intelligent Systems and Applications in Engineering
Author:  
Abstract:

Abstract Different sensors, digital devices, and objects may all sense their surroundings thanks to the Internet of Things (IoT) concept, which also links them to the worldwide Internet for data exchange. Integrating Edge, Fog, and Cloud infrastructure is becoming more necessary to enable Internet of Things (IoT) applications that are both latency-sensitive and computationally heavy. Security in the IoT, particularly for healthcare applications, is a big issue. In this research, a unique, lightweight encryption method for Internet of Things (IoT) based on fog is developed. For the execution and interaction of IoT applications and compute instances, Fog Bus provides a platform-independent interface. It lets service providers manage their resources as well as customers run numerous apps simultaneously and developers create applications. In order to safeguard activities on sensitive data, Fog Bus also uses Blockchain, authentication, and encryption mechanisms. For enhancing security, the blockchain with Tiny Lightweight Symmetric Encryption (TLSE) is introduced. The TLSE chooses the best key by taking the Aquila Optimization Algorithm into account (AOA). The UCI machine library is used to gather health care data in order to verify the proposed approach. The suggested method is put into practice using Python, and it is contrasted with more established methods like Rivest-Shamir-Adleman (RSA) and elliptical curve cryptography (ECC), respectively.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles












International Journal of Intelligent Systems and Applications in Engineering

Field :   Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 1.632
Cite : 489
2023 Impact : 0.054
International Journal of Intelligent Systems and Applications in Engineering