Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology
In general, the malicious hackers can infiltrate tens of thousands or millions of insecure computers, disable infrastructure, shut down networks, and access personal information. The hackers use some security vulnerabilities in the network to steal and use the required data. And things like the buck...
Gespeichert in:
Veröffentlicht in: | Wireless communications and mobile computing 2023, Vol.2023, p.1-9 |
---|---|
Hauptverfasser: | , , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 9 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2023 |
creator | Savithri, M. Pradeepa, M. Prasad, D. Rajendra Gangodkar, Durgaprasad Rajalakshmi, R. Shafi, Shaik Sinchana, N. M. Prasanna Kumar, K. R. Selvam, Nagarajan |
description | In general, the malicious hackers can infiltrate tens of thousands or millions of insecure computers, disable infrastructure, shut down networks, and access personal information. The hackers use some security vulnerabilities in the network to steal and use the required data. And things like the buck they do with advanced technologies are constantly providing them with the data they need, not just once and no matter how protective the firewalls on the Internet are, there is still an increase in cybercrime. This was affected the Quality of Service (QoS) of a wearable device. In this paper, an improved QoS model was proposed to enhance the IoT smart systems. This algorithm was helpful to prevent the smart IoT device from the vulnerable hacking. This system was compared with the existing algorithms, and the results are displayed the below sections. The suggested method performs more than 96 percent of input entry authentication and about 3 percent of password cracking actions. The source code security management was then upgraded to 99.9%. Finally, the number of updating difficulties for various device entries was decreased by 0.02 percent, and the number of privacy breaches was reduced by up to 0.32 percent. Hence, the proposed method was more secured and free from cyber security issues. |
doi_str_mv | 10.1155/2023/6709109 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2804974213</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2804974213</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2099-434e42fa6bc132d78e2ce7851073fad32250d6b90e0ef7b605803547fe72d8023</originalsourceid><addsrcrecordid>eNp9kEFLAzEQhYMoWKs3f0DAo66dJJvN5ii11kJBxBWPSzY7225pk5q0Sv-921Y8enrD8L0Z3iPkmsE9Y1IOOHAxyBRoBvqE9JgUkOSZUqd_c6bPyUWMCwAQwFmPFCM3N87iCt2G-oa--jfaOjpxGwwOD6ti3rpZpB9ogqmWSB_xq7UYO12jqw8-R-WYFmjnzi_9bHdJzhqzjHj1q33y_jQqhs_J9GU8GT5ME8tB6yQVKaa8MVllmeC1ypFbVLlkoERjasG5hDqrNCBgo6oMZA5CpqpBxeu8y9onN8e76-A_txg35cJvg-teljyHVKuUM9FRd0fKBh9jwKZch3Zlwq5kUO57K_e9lb-9dfjtEe9i1-a7_Z_-AeH9alU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2804974213</pqid></control><display><type>article</type><title>Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>Alma/SFX Local Collection</source><creator>Savithri, M. ; Pradeepa, M. ; Prasad, D. Rajendra ; Gangodkar, Durgaprasad ; Rajalakshmi, R. ; Shafi, Shaik ; Sinchana, N. M. ; Prasanna Kumar, K. R. ; Selvam, Nagarajan</creator><contributor>Hashmi, Mohammad Farukh ; Mohammad Farukh Hashmi</contributor><creatorcontrib>Savithri, M. ; Pradeepa, M. ; Prasad, D. Rajendra ; Gangodkar, Durgaprasad ; Rajalakshmi, R. ; Shafi, Shaik ; Sinchana, N. M. ; Prasanna Kumar, K. R. ; Selvam, Nagarajan ; Hashmi, Mohammad Farukh ; Mohammad Farukh Hashmi</creatorcontrib><description>In general, the malicious hackers can infiltrate tens of thousands or millions of insecure computers, disable infrastructure, shut down networks, and access personal information. The hackers use some security vulnerabilities in the network to steal and use the required data. And things like the buck they do with advanced technologies are constantly providing them with the data they need, not just once and no matter how protective the firewalls on the Internet are, there is still an increase in cybercrime. This was affected the Quality of Service (QoS) of a wearable device. In this paper, an improved QoS model was proposed to enhance the IoT smart systems. This algorithm was helpful to prevent the smart IoT device from the vulnerable hacking. This system was compared with the existing algorithms, and the results are displayed the below sections. The suggested method performs more than 96 percent of input entry authentication and about 3 percent of password cracking actions. The source code security management was then upgraded to 99.9%. Finally, the number of updating difficulties for various device entries was decreased by 0.02 percent, and the number of privacy breaches was reduced by up to 0.32 percent. Hence, the proposed method was more secured and free from cyber security issues.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2023/6709109</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Accelerometers ; Algorithms ; Cameras ; Communication ; Computers ; Cybercrime ; Cybersecurity ; Hackers ; Heart rate ; Internet of Things ; Optimization techniques ; Sensors ; Source code ; Surveillance ; User groups ; Wearable computers ; Wearable technology</subject><ispartof>Wireless communications and mobile computing, 2023, Vol.2023, p.1-9</ispartof><rights>Copyright © 2023 M. Savithri et al.</rights><rights>Copyright © 2023 M. Savithri et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c2099-434e42fa6bc132d78e2ce7851073fad32250d6b90e0ef7b605803547fe72d8023</cites><orcidid>0000-0002-7695-0104</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4024,27923,27924,27925</link.rule.ids></links><search><contributor>Hashmi, Mohammad Farukh</contributor><contributor>Mohammad Farukh Hashmi</contributor><creatorcontrib>Savithri, M.</creatorcontrib><creatorcontrib>Pradeepa, M.</creatorcontrib><creatorcontrib>Prasad, D. Rajendra</creatorcontrib><creatorcontrib>Gangodkar, Durgaprasad</creatorcontrib><creatorcontrib>Rajalakshmi, R.</creatorcontrib><creatorcontrib>Shafi, Shaik</creatorcontrib><creatorcontrib>Sinchana, N. M.</creatorcontrib><creatorcontrib>Prasanna Kumar, K. R.</creatorcontrib><creatorcontrib>Selvam, Nagarajan</creatorcontrib><title>Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology</title><title>Wireless communications and mobile computing</title><description>In general, the malicious hackers can infiltrate tens of thousands or millions of insecure computers, disable infrastructure, shut down networks, and access personal information. The hackers use some security vulnerabilities in the network to steal and use the required data. And things like the buck they do with advanced technologies are constantly providing them with the data they need, not just once and no matter how protective the firewalls on the Internet are, there is still an increase in cybercrime. This was affected the Quality of Service (QoS) of a wearable device. In this paper, an improved QoS model was proposed to enhance the IoT smart systems. This algorithm was helpful to prevent the smart IoT device from the vulnerable hacking. This system was compared with the existing algorithms, and the results are displayed the below sections. The suggested method performs more than 96 percent of input entry authentication and about 3 percent of password cracking actions. The source code security management was then upgraded to 99.9%. Finally, the number of updating difficulties for various device entries was decreased by 0.02 percent, and the number of privacy breaches was reduced by up to 0.32 percent. Hence, the proposed method was more secured and free from cyber security issues.</description><subject>Accelerometers</subject><subject>Algorithms</subject><subject>Cameras</subject><subject>Communication</subject><subject>Computers</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Hackers</subject><subject>Heart rate</subject><subject>Internet of Things</subject><subject>Optimization techniques</subject><subject>Sensors</subject><subject>Source code</subject><subject>Surveillance</subject><subject>User groups</subject><subject>Wearable computers</subject><subject>Wearable technology</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kEFLAzEQhYMoWKs3f0DAo66dJJvN5ii11kJBxBWPSzY7225pk5q0Sv-921Y8enrD8L0Z3iPkmsE9Y1IOOHAxyBRoBvqE9JgUkOSZUqd_c6bPyUWMCwAQwFmPFCM3N87iCt2G-oa--jfaOjpxGwwOD6ti3rpZpB9ogqmWSB_xq7UYO12jqw8-R-WYFmjnzi_9bHdJzhqzjHj1q33y_jQqhs_J9GU8GT5ME8tB6yQVKaa8MVllmeC1ypFbVLlkoERjasG5hDqrNCBgo6oMZA5CpqpBxeu8y9onN8e76-A_txg35cJvg-teljyHVKuUM9FRd0fKBh9jwKZch3Zlwq5kUO57K_e9lb-9dfjtEe9i1-a7_Z_-AeH9alU</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Savithri, M.</creator><creator>Pradeepa, M.</creator><creator>Prasad, D. Rajendra</creator><creator>Gangodkar, Durgaprasad</creator><creator>Rajalakshmi, R.</creator><creator>Shafi, Shaik</creator><creator>Sinchana, N. M.</creator><creator>Prasanna Kumar, K. R.</creator><creator>Selvam, Nagarajan</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-7695-0104</orcidid></search><sort><creationdate>2023</creationdate><title>Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology</title><author>Savithri, M. ; Pradeepa, M. ; Prasad, D. Rajendra ; Gangodkar, Durgaprasad ; Rajalakshmi, R. ; Shafi, Shaik ; Sinchana, N. M. ; Prasanna Kumar, K. R. ; Selvam, Nagarajan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2099-434e42fa6bc132d78e2ce7851073fad32250d6b90e0ef7b605803547fe72d8023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Accelerometers</topic><topic>Algorithms</topic><topic>Cameras</topic><topic>Communication</topic><topic>Computers</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Hackers</topic><topic>Heart rate</topic><topic>Internet of Things</topic><topic>Optimization techniques</topic><topic>Sensors</topic><topic>Source code</topic><topic>Surveillance</topic><topic>User groups</topic><topic>Wearable computers</topic><topic>Wearable technology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Savithri, M.</creatorcontrib><creatorcontrib>Pradeepa, M.</creatorcontrib><creatorcontrib>Prasad, D. Rajendra</creatorcontrib><creatorcontrib>Gangodkar, Durgaprasad</creatorcontrib><creatorcontrib>Rajalakshmi, R.</creatorcontrib><creatorcontrib>Shafi, Shaik</creatorcontrib><creatorcontrib>Sinchana, N. M.</creatorcontrib><creatorcontrib>Prasanna Kumar, K. R.</creatorcontrib><creatorcontrib>Selvam, Nagarajan</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Savithri, M.</au><au>Pradeepa, M.</au><au>Prasad, D. Rajendra</au><au>Gangodkar, Durgaprasad</au><au>Rajalakshmi, R.</au><au>Shafi, Shaik</au><au>Sinchana, N. M.</au><au>Prasanna Kumar, K. R.</au><au>Selvam, Nagarajan</au><au>Hashmi, Mohammad Farukh</au><au>Mohammad Farukh Hashmi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2023</date><risdate>2023</risdate><volume>2023</volume><spage>1</spage><epage>9</epage><pages>1-9</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>In general, the malicious hackers can infiltrate tens of thousands or millions of insecure computers, disable infrastructure, shut down networks, and access personal information. The hackers use some security vulnerabilities in the network to steal and use the required data. And things like the buck they do with advanced technologies are constantly providing them with the data they need, not just once and no matter how protective the firewalls on the Internet are, there is still an increase in cybercrime. This was affected the Quality of Service (QoS) of a wearable device. In this paper, an improved QoS model was proposed to enhance the IoT smart systems. This algorithm was helpful to prevent the smart IoT device from the vulnerable hacking. This system was compared with the existing algorithms, and the results are displayed the below sections. The suggested method performs more than 96 percent of input entry authentication and about 3 percent of password cracking actions. The source code security management was then upgraded to 99.9%. Finally, the number of updating difficulties for various device entries was decreased by 0.02 percent, and the number of privacy breaches was reduced by up to 0.32 percent. Hence, the proposed method was more secured and free from cyber security issues.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2023/6709109</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0002-7695-0104</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2023, Vol.2023, p.1-9 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2804974213 |
source | EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); Alma/SFX Local Collection |
subjects | Accelerometers Algorithms Cameras Communication Computers Cybercrime Cybersecurity Hackers Heart rate Internet of Things Optimization techniques Sensors Source code Surveillance User groups Wearable computers Wearable technology |
title | Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T20%3A55%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enhancement%20of%20QoS%20in%20Internet%20of%20Things%20Wearable%20Devices%20Dependent%20on%205G%20Technology&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Savithri,%20M.&rft.date=2023&rft.volume=2023&rft.spage=1&rft.epage=9&rft.pages=1-9&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2023/6709109&rft_dat=%3Cproquest_cross%3E2804974213%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2804974213&rft_id=info:pmid/&rfr_iscdi=true |