TD

Tannishtha Devgun

6 records found

AALMOND

Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks

Access control (AC) is an important security parameter in industrial networks; a mismanaged AC system leads to security breaches. The existing security solutions significantly consider the AC methods in the Industrial Internet of Things (IIoT); however, falsified identity can byp ...

GREPHRO

Nature-inspired optimization duo for Internet-of-Things

The optimization techniques usually work with the maximization or minimization of the problem to obtain the local loci or cumulative global loci. Two-dimensional bio-inspired optimization techniques face convexing problems towards a global solution and use an increased number of ...

COUNT

Blockchain framework for resource accountability in e-healthcare

The progress of sensor devices, digital communication, and computing techniques enhances the functionalities of e-healthcare, where the medical facilities are manageable based on the Internet. Now a days, e-healthcare not only helps in disease diagnosis, or tele-medicine, but als ...

BENIGREEN

Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT

The energy conservative extension of the Internet of Things (IoT), green IoT, is a revolutionary approach in connecting people, processes, and things in an energy-efficient way. The existing research works in the domain of green IoT forbid the use of decentralized management (e.g ...

DHACS

Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things

The integration between blockchains, Internet-of-Thing (IoT), and smart contracts is an emerging and promising technology. The advantages of this technology have raised the importance of Industrial Internet-of-Thing (IIoT) and have paved the pathway for 'Industry 4.0.' Surprising ...
Internet-of-Thing (IoT) faces various security attacks. Different solutions exist to mitigate the intrusion problems. However, the existing solutions lack behind in dealing with heterogeneity of attack sources and features. The future anticipated demand of devices' connections al ...