Yazar "Keshta, Ismail" seçeneğine göre listele
Listeleniyor 1 - 2 / 2
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe A computer-aided feature-based encryption model with concealed access structure for medical Internet of Things(Elsevier Inc., 2023) Vaidya, Sumit; Suri, Ashish; Batla, Vishnu; Keshta, Ismail; Ajibade, Samuel-Soma M.; Safarov, GiyosiddinOne of the Internet of Things (IoT) security issues is the secure sharing and granular management of data access. This study recommends a feature-based encryption scheme with a hidden access structure for medical IoT data security. While establishing fine-grained access control of ciphertext data, the system can guarantee clinical client data privacy. First, it is recommended to convert identity-based encryption (IBE) into a feature-based encryption model (FBEM) using a universal conversion technique that supports multi-valued attributes and gates. IBE characteristics could be inherited by the converted FBEM. The conversion method is then used to change the receiver anonymous IBE scheme into the FBEM scheme with concealed access structure. The FBEM model is then used to construct the IoT scenario for the smart medical application. Theoretical analysis and experimental findings reveal that the suggested system provides advantages over prominent systems regarding computing efficiency, storage load, and security when the access structure is disguised.Öğe Smart robots' virus defense using data mining technology(Walter de Gruyter GmbH, 2023) Ye, Jiao; Patel, Hemant N.; Meena, Sankaranamasivayam; Maaliw, Renato R.; Ajibade, Samuel-Soma M.; Keshta, IsmailIn order to realize online detection and control of network viruses in robots, the authors propose a data mining-based anti-virus solution for smart robots. First, using internet of things (IoT) intrusion preven tion system design method based on network intrusion signal detection and feedforward modulation filtering design, the overall design description and function analysis are carried out, and then the intrusion signal detection algorithm is designed, and finally, the hardware design and software development for a breach protection solution for the IoT are completed, and the integrated design of the system is realized. The findings demonstrated that based on the mean value of 10,000 tests, the IoT’s average packet loss rate is 0. Conclusion: This system has high accuracy, good performance, and strong compatibility and friendliness.