Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation

22Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In terms of growth, effect, and capability, the 5G-enabled Internet of Things (IoT) is incredible. The volume of data distributed and processed by IoT (Internet of Things) systems that trust connectivity and coverage raises some security problems. As IoT technology is directly used in our daily lives, the threats of present cyberspace may grow more prominent globally. Extended network life, coverage, and connectivity are all required for securing IoT-based 5G network devices. As a result of these failures, there are flaws that lead to security breaches. Because purposeful faults can quickly render the entire network dysfunctional, they are more difficult to identify than unexpected failures. Securing IoT-based 5G Network Device Connectivity and Coverage for expending Encryption and Authentication Scheme (EAS) framework is proposed in this study, which uses novel security flaws. In this research, we proposed a Boltzmann machine (BMKG)-based encryption algorithm for securing 5G-enabled IoT device network environment and compared various asymmetric algorithms for key exchange.

Cite

CITATION STYLE

APA

Rajawat, A. S., Bedi, P., Goyal, S. B., Shukla, P. K., Jamal, S. S., Alharbi, A. R., & Aljaedi, A. (2021). Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation. Mathematical Problems in Engineering, 2021. https://doi.org/10.1155/2021/2330049

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free