z-logo
open-access-imgOpen Access
Improving the security of the organization from the shadow IoT using Blow-fish encryption algorithm
Author(s) -
Mr. M. Senthilkumar Senthilkumar,
Murugan Murugan
Publication year - 2022
Publication title -
the international halal science and technology conference
Language(s) - English
Resource type - Journals
ISSN - 2828-1985
DOI - 10.31098/ihsatec.v14i1.483
Subject(s) - computer security , computer science , internet of things , encryption , smart city , variety (cybernetics) , artificial intelligence
Smart cities, traffic congestion, waste management, structural health, security, emergency services, logistics, retail, industrial control, and health care are just a few of the applications that the Internet of Things (IoT) can help with. The Internet of Things (IoT) is a mega-technology that can connect to anything, anybody, at any time, place, platform, and network. It has a significant impact on the entire blockchain of enterprises, smart objects, and devices, systems, and services provided by heterogeneous network connection (HNC) and is being developed as a smart pervasive framework for smart devices. Because IoT devices link to complicated equipment, interact with hostile surroundings and are deployed on a variety of unregulated platforms, they confront several security risks and challenges. Because the Internet of Things (IoT) has the capacity to integrate any sort of network or sophisticated system, it may be vulnerable to vulnerabilities inherent in the separate systems that make up the integrated network. The purpose of this research paper is to investigate the security issues that individual systems responsible for IoT interconnection face, as well as their impact on the overall IoT system.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here