A ANALYSIS ON IOT PLATEFORM BASED IMAGE ENHANCEMENT WITH IMAGE ENRRYPTION

Shubhra Jain Dilip Ahirwar Anjan Gupta

Abstract


The hardware implementation of thealgorithm can be done on a low cost system.

Keywords


,

Full Text:

PDF

References


KONG Liuyong, LI Lin “A new image encryption algorithm based on Chaos”, Proceedings of the 35th Chinese Control Conference July 27-29, 2016,

R. Want and S. Dustdar, “Activating the internet of things [guest editors’ introduction]”, Computer, vol. 48, no. 9, pp. 16–20, 2015.

J. Romero-Mariona, R. Hallman, M. Kline, J. San Miguel, M. Major,

and L. Kerr, “Security in the industrial internet of things”, 2016.

H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the internet of things: a review”, in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol. 3. IEEE, 2012, pp. 648–651.

G. Ho, D. Leung, P. Mishra, A. Hosseini, D. Song, and D. Wagner, “Smart locks: Lessons for securing commodity internet of things devices,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, 2016, pp. 461–472.

D. Airehrour, J. Gutierrez, and S. K. Ray, “Secure routing for internet of things: A survey,” Journal of Network and Computer Applications, vol. 66, pp. 198–213, 2016.

D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012.

L. Da Xu, “Enterprise systems: state-of-the-art and future trends,” IEEETransactions on Industrial Informatics, vol. 7, no. 4, pp. 630–640, 2011.

P. Barreto and V. Rijmen, “The khazad legacy-level block cipher,” Primitive submitted to NESSIE, vol. 97, 2000.

Y. Li, M. Hou, H. Liu, and Y. Liu, “Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of internet of things,” Information Technology and Management, vol. 13, no. 4, pp. 205–216, 2012.

Z. Pang, Q. Chen, J. Tian, L. Zheng, and E. Dubrova, “Ecosystemanalysis in the design of open platform-based in-home healthcare terminals towards the internet-of-things,” in Advanced Communication Technology (ICACT), 2013 15th International Conference on. IEEE, 2013, pp. 529–534.

S. Misra, M. Maheswaran, and S. Hashmi, “Security challenges and approaches in internet of things,” 2016.

M. C. Domingo, “An overview of the internet of things for people with disabilities,” Journal of Network and Computer Applications, vol. 35, no. 2, pp. 584–596, 2012.

W. Qiuping, Z. Shunbing, and D. Chunquan, “Study on key technologies of internet of things perceiving mine,” Procedia Engineering, vol. 26, pp. 2326–2333, 2011.

H. Zhou, B. Liu, and D. Wang, “Design and research of urban intelligent transportation system based on the internet of things,” in Internet of Things. Springer, 2012, pp. 572–580.

B. Karakostas, “A dns architecture for the internet of things: A case

study in transport logistics,” Procedia Computer Science, vol. 19, pp. 594–601, 2013.

H. J. Ban, J. Choi, and N. Kang, “Fine-grained support of security services for resource constrained internet of things,” International Journal of Distributed Sensor Networks, vol. 2016, 2016.

Jaiwei Han et.al 2001 Data Mining: concepts and Techniques, Morgan Kaugmann publishers

P. L. L. P. Pan Wang, Professor SohailChaudhry, S. Li, T. Tryfonas, and H. Li, “The internet of things: a security point of view,” Internet Research, vol. 26, no. 2, pp. 337–359, 2016.

M. Ebrahim, S. Khan, and U. Khalid, “Security risk analysis in peer 2 peer system; an approach towards surmounting security challenges,” arXiv preprint arXiv:1404.5123, 2014.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Shubhra Jain Dilip Ahirwar Anjan Gupta