Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology

In general, the malicious hackers can infiltrate tens of thousands or millions of insecure computers, disable infrastructure, shut down networks, and access personal information. The hackers use some security vulnerabilities in the network to steal and use the required data. And things like the buck...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless communications and mobile computing 2023, Vol.2023, p.1-9
Hauptverfasser: Savithri, M., Pradeepa, M., Prasad, D. Rajendra, Gangodkar, Durgaprasad, Rajalakshmi, R., Shafi, Shaik, Sinchana, N. M., Prasanna Kumar, K. R., Selvam, Nagarajan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 9
container_issue
container_start_page 1
container_title Wireless communications and mobile computing
container_volume 2023
creator Savithri, M.
Pradeepa, M.
Prasad, D. Rajendra
Gangodkar, Durgaprasad
Rajalakshmi, R.
Shafi, Shaik
Sinchana, N. M.
Prasanna Kumar, K. R.
Selvam, Nagarajan
description In general, the malicious hackers can infiltrate tens of thousands or millions of insecure computers, disable infrastructure, shut down networks, and access personal information. The hackers use some security vulnerabilities in the network to steal and use the required data. And things like the buck they do with advanced technologies are constantly providing them with the data they need, not just once and no matter how protective the firewalls on the Internet are, there is still an increase in cybercrime. This was affected the Quality of Service (QoS) of a wearable device. In this paper, an improved QoS model was proposed to enhance the IoT smart systems. This algorithm was helpful to prevent the smart IoT device from the vulnerable hacking. This system was compared with the existing algorithms, and the results are displayed the below sections. The suggested method performs more than 96 percent of input entry authentication and about 3 percent of password cracking actions. The source code security management was then upgraded to 99.9%. Finally, the number of updating difficulties for various device entries was decreased by 0.02 percent, and the number of privacy breaches was reduced by up to 0.32 percent. Hence, the proposed method was more secured and free from cyber security issues.
doi_str_mv 10.1155/2023/6709109
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2804974213</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2804974213</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2099-434e42fa6bc132d78e2ce7851073fad32250d6b90e0ef7b605803547fe72d8023</originalsourceid><addsrcrecordid>eNp9kEFLAzEQhYMoWKs3f0DAo66dJJvN5ii11kJBxBWPSzY7225pk5q0Sv-921Y8enrD8L0Z3iPkmsE9Y1IOOHAxyBRoBvqE9JgUkOSZUqd_c6bPyUWMCwAQwFmPFCM3N87iCt2G-oa--jfaOjpxGwwOD6ti3rpZpB9ogqmWSB_xq7UYO12jqw8-R-WYFmjnzi_9bHdJzhqzjHj1q33y_jQqhs_J9GU8GT5ME8tB6yQVKaa8MVllmeC1ypFbVLlkoERjasG5hDqrNCBgo6oMZA5CpqpBxeu8y9onN8e76-A_txg35cJvg-teljyHVKuUM9FRd0fKBh9jwKZch3Zlwq5kUO57K_e9lb-9dfjtEe9i1-a7_Z_-AeH9alU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2804974213</pqid></control><display><type>article</type><title>Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>Alma/SFX Local Collection</source><creator>Savithri, M. ; Pradeepa, M. ; Prasad, D. Rajendra ; Gangodkar, Durgaprasad ; Rajalakshmi, R. ; Shafi, Shaik ; Sinchana, N. M. ; Prasanna Kumar, K. R. ; Selvam, Nagarajan</creator><contributor>Hashmi, Mohammad Farukh ; Mohammad Farukh Hashmi</contributor><creatorcontrib>Savithri, M. ; Pradeepa, M. ; Prasad, D. Rajendra ; Gangodkar, Durgaprasad ; Rajalakshmi, R. ; Shafi, Shaik ; Sinchana, N. M. ; Prasanna Kumar, K. R. ; Selvam, Nagarajan ; Hashmi, Mohammad Farukh ; Mohammad Farukh Hashmi</creatorcontrib><description>In general, the malicious hackers can infiltrate tens of thousands or millions of insecure computers, disable infrastructure, shut down networks, and access personal information. The hackers use some security vulnerabilities in the network to steal and use the required data. And things like the buck they do with advanced technologies are constantly providing them with the data they need, not just once and no matter how protective the firewalls on the Internet are, there is still an increase in cybercrime. This was affected the Quality of Service (QoS) of a wearable device. In this paper, an improved QoS model was proposed to enhance the IoT smart systems. This algorithm was helpful to prevent the smart IoT device from the vulnerable hacking. This system was compared with the existing algorithms, and the results are displayed the below sections. The suggested method performs more than 96 percent of input entry authentication and about 3 percent of password cracking actions. The source code security management was then upgraded to 99.9%. Finally, the number of updating difficulties for various device entries was decreased by 0.02 percent, and the number of privacy breaches was reduced by up to 0.32 percent. Hence, the proposed method was more secured and free from cyber security issues.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2023/6709109</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Accelerometers ; Algorithms ; Cameras ; Communication ; Computers ; Cybercrime ; Cybersecurity ; Hackers ; Heart rate ; Internet of Things ; Optimization techniques ; Sensors ; Source code ; Surveillance ; User groups ; Wearable computers ; Wearable technology</subject><ispartof>Wireless communications and mobile computing, 2023, Vol.2023, p.1-9</ispartof><rights>Copyright © 2023 M. Savithri et al.</rights><rights>Copyright © 2023 M. Savithri et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c2099-434e42fa6bc132d78e2ce7851073fad32250d6b90e0ef7b605803547fe72d8023</cites><orcidid>0000-0002-7695-0104</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4024,27923,27924,27925</link.rule.ids></links><search><contributor>Hashmi, Mohammad Farukh</contributor><contributor>Mohammad Farukh Hashmi</contributor><creatorcontrib>Savithri, M.</creatorcontrib><creatorcontrib>Pradeepa, M.</creatorcontrib><creatorcontrib>Prasad, D. Rajendra</creatorcontrib><creatorcontrib>Gangodkar, Durgaprasad</creatorcontrib><creatorcontrib>Rajalakshmi, R.</creatorcontrib><creatorcontrib>Shafi, Shaik</creatorcontrib><creatorcontrib>Sinchana, N. M.</creatorcontrib><creatorcontrib>Prasanna Kumar, K. R.</creatorcontrib><creatorcontrib>Selvam, Nagarajan</creatorcontrib><title>Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology</title><title>Wireless communications and mobile computing</title><description>In general, the malicious hackers can infiltrate tens of thousands or millions of insecure computers, disable infrastructure, shut down networks, and access personal information. The hackers use some security vulnerabilities in the network to steal and use the required data. And things like the buck they do with advanced technologies are constantly providing them with the data they need, not just once and no matter how protective the firewalls on the Internet are, there is still an increase in cybercrime. This was affected the Quality of Service (QoS) of a wearable device. In this paper, an improved QoS model was proposed to enhance the IoT smart systems. This algorithm was helpful to prevent the smart IoT device from the vulnerable hacking. This system was compared with the existing algorithms, and the results are displayed the below sections. The suggested method performs more than 96 percent of input entry authentication and about 3 percent of password cracking actions. The source code security management was then upgraded to 99.9%. Finally, the number of updating difficulties for various device entries was decreased by 0.02 percent, and the number of privacy breaches was reduced by up to 0.32 percent. Hence, the proposed method was more secured and free from cyber security issues.</description><subject>Accelerometers</subject><subject>Algorithms</subject><subject>Cameras</subject><subject>Communication</subject><subject>Computers</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Hackers</subject><subject>Heart rate</subject><subject>Internet of Things</subject><subject>Optimization techniques</subject><subject>Sensors</subject><subject>Source code</subject><subject>Surveillance</subject><subject>User groups</subject><subject>Wearable computers</subject><subject>Wearable technology</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kEFLAzEQhYMoWKs3f0DAo66dJJvN5ii11kJBxBWPSzY7225pk5q0Sv-921Y8enrD8L0Z3iPkmsE9Y1IOOHAxyBRoBvqE9JgUkOSZUqd_c6bPyUWMCwAQwFmPFCM3N87iCt2G-oa--jfaOjpxGwwOD6ti3rpZpB9ogqmWSB_xq7UYO12jqw8-R-WYFmjnzi_9bHdJzhqzjHj1q33y_jQqhs_J9GU8GT5ME8tB6yQVKaa8MVllmeC1ypFbVLlkoERjasG5hDqrNCBgo6oMZA5CpqpBxeu8y9onN8e76-A_txg35cJvg-teljyHVKuUM9FRd0fKBh9jwKZch3Zlwq5kUO57K_e9lb-9dfjtEe9i1-a7_Z_-AeH9alU</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Savithri, M.</creator><creator>Pradeepa, M.</creator><creator>Prasad, D. Rajendra</creator><creator>Gangodkar, Durgaprasad</creator><creator>Rajalakshmi, R.</creator><creator>Shafi, Shaik</creator><creator>Sinchana, N. M.</creator><creator>Prasanna Kumar, K. R.</creator><creator>Selvam, Nagarajan</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-7695-0104</orcidid></search><sort><creationdate>2023</creationdate><title>Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology</title><author>Savithri, M. ; Pradeepa, M. ; Prasad, D. Rajendra ; Gangodkar, Durgaprasad ; Rajalakshmi, R. ; Shafi, Shaik ; Sinchana, N. M. ; Prasanna Kumar, K. R. ; Selvam, Nagarajan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2099-434e42fa6bc132d78e2ce7851073fad32250d6b90e0ef7b605803547fe72d8023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Accelerometers</topic><topic>Algorithms</topic><topic>Cameras</topic><topic>Communication</topic><topic>Computers</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Hackers</topic><topic>Heart rate</topic><topic>Internet of Things</topic><topic>Optimization techniques</topic><topic>Sensors</topic><topic>Source code</topic><topic>Surveillance</topic><topic>User groups</topic><topic>Wearable computers</topic><topic>Wearable technology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Savithri, M.</creatorcontrib><creatorcontrib>Pradeepa, M.</creatorcontrib><creatorcontrib>Prasad, D. Rajendra</creatorcontrib><creatorcontrib>Gangodkar, Durgaprasad</creatorcontrib><creatorcontrib>Rajalakshmi, R.</creatorcontrib><creatorcontrib>Shafi, Shaik</creatorcontrib><creatorcontrib>Sinchana, N. M.</creatorcontrib><creatorcontrib>Prasanna Kumar, K. R.</creatorcontrib><creatorcontrib>Selvam, Nagarajan</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Savithri, M.</au><au>Pradeepa, M.</au><au>Prasad, D. Rajendra</au><au>Gangodkar, Durgaprasad</au><au>Rajalakshmi, R.</au><au>Shafi, Shaik</au><au>Sinchana, N. M.</au><au>Prasanna Kumar, K. R.</au><au>Selvam, Nagarajan</au><au>Hashmi, Mohammad Farukh</au><au>Mohammad Farukh Hashmi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2023</date><risdate>2023</risdate><volume>2023</volume><spage>1</spage><epage>9</epage><pages>1-9</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>In general, the malicious hackers can infiltrate tens of thousands or millions of insecure computers, disable infrastructure, shut down networks, and access personal information. The hackers use some security vulnerabilities in the network to steal and use the required data. And things like the buck they do with advanced technologies are constantly providing them with the data they need, not just once and no matter how protective the firewalls on the Internet are, there is still an increase in cybercrime. This was affected the Quality of Service (QoS) of a wearable device. In this paper, an improved QoS model was proposed to enhance the IoT smart systems. This algorithm was helpful to prevent the smart IoT device from the vulnerable hacking. This system was compared with the existing algorithms, and the results are displayed the below sections. The suggested method performs more than 96 percent of input entry authentication and about 3 percent of password cracking actions. The source code security management was then upgraded to 99.9%. Finally, the number of updating difficulties for various device entries was decreased by 0.02 percent, and the number of privacy breaches was reduced by up to 0.32 percent. Hence, the proposed method was more secured and free from cyber security issues.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2023/6709109</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0002-7695-0104</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2023, Vol.2023, p.1-9
issn 1530-8669
1530-8677
language eng
recordid cdi_proquest_journals_2804974213
source EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); Alma/SFX Local Collection
subjects Accelerometers
Algorithms
Cameras
Communication
Computers
Cybercrime
Cybersecurity
Hackers
Heart rate
Internet of Things
Optimization techniques
Sensors
Source code
Surveillance
User groups
Wearable computers
Wearable technology
title Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T20%3A55%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enhancement%20of%20QoS%20in%20Internet%20of%20Things%20Wearable%20Devices%20Dependent%20on%205G%20Technology&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Savithri,%20M.&rft.date=2023&rft.volume=2023&rft.spage=1&rft.epage=9&rft.pages=1-9&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2023/6709109&rft_dat=%3Cproquest_cross%3E2804974213%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2804974213&rft_id=info:pmid/&rfr_iscdi=true