DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

An Intelligent and Secure Communication of AIoT enabled Devices empowered with IPK Algorithm


Article Information

Title: An Intelligent and Secure Communication of AIoT enabled Devices empowered with IPK Algorithm

Authors: Muhammad Adnan Khan

Journal: Lahore Garrison University Research Journal of Computer Science and Information Technology (LGURJCSIT)

HEC Recognition History
Category From To
Y 2024-10-01 2025-12-31
Y 2023-07-01 2024-09-30
Y 2022-07-01 2023-06-30
Y 2021-07-01 2022-06-30
Y 2020-07-01 2021-06-30

Publisher: Lahore Garrison University, Lahore

Country: Pakistan

Year: 2019

Volume: 3

Issue: 4

Language: English

DOI: 10.54692/lgurjcsit.2019.030487

Keywords: AIoTD2D CommunicationEncryptionDecryptionCoAPsecure communication algorithm

Categories

Abstract

Artificial intelligence Internet of Things (AIoT) will be a necessary part of our lives in the near future. It will be found as quick cooperation in our surroundings through the related sensor-based system. To be sure, even in an indirect method, it will serve us in a couple of structures as esteem included organizations over the cell stages. With the AIoT structures that make usage of data, actually, the data collection from contraptions can in like manner be a goal of cyberattacks. Device to Device (D-2-D) interchanges in AIoT was planned alongside various shows, for instance, Constrained Access Protocol (CoAP). Its huge stresses in the course of action of AIoT are to ensure the security of mechanisms and D-2-D one place to another. Furthermore, present correspondence shows for AIoT arewithout reliability features. It is a result of this that countermeasures in perspective on encryption are starting at now getting importance. There is a requirement for a solid cryptosystem for D-2-D in AIoT. In this investigation paper, we present an encryption technique which is indicated as EPEB as a security answer for AIoT. The proposed methodology works with the message which shows special characters, numbers, and bits for data encryption and decryption. In authority, the end key isn't known so we would encryption to able have the option to gadgets data using particular keys and scramble packet per specialkey.


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...