Secured IIoT against trust deficit - A flexi cryptic approach

V. M. Padmapriya,K. Thenmozhi,M. Hemalatha,V. Thanikaiselvan,C. Lakshmi,Nithya Chidambaram,Amirtharajan Rengarajan
DOI: https://doi.org/10.1007/s11042-024-18962-x
IF: 2.577
2024-04-10
Multimedia Tools and Applications
Abstract:This research allows the secure surveillance approach for the Internet of Things (IoT) methodology to be developed by integrating wireless signalling and image encryption strategy. Since the Cloud Service Telco (CST) is a semi-trusted body in cloud services, user data is encrypted before uploading to a cloud server for data protection from disclosure. The flexibility of encrypted data sharing is essential for cloud storage users. This study investigates the Discrete Wavelet Transform (DWT) technique with modified Huffman compression and Elliptic Curve Cryptography (ECC). It encrypts and decrypts the data and enhances industrial security surveillance in transmission. It uses the wireless network's next generation (5G or 6G) as uplink Single Carrier Frequency Division Multiple Access (SC-FDMA) strategies via the IoT. This study presented a novel approach to proposing hardware architecture for a secure web camera integrated with the Atmel in the mega AVR family (ATMEGA) microcontroller, suitable for IoT applications. The experimental results confirm the proposed model's efficacy compared with existing robustness and security analysis algorithms. These systems are also used by implementing industry-standard protocols using IoTs to monitor industrial applications. The proposed framework can also minimise bandwidth, transmission cost, storage space, tracking data, and decisions about abnormal events such as potential fraud and extinguisher detection in surveilling applications.
computer science, information systems, theory & methods,engineering, electrical & electronic, software engineering
What problem does this paper attempt to address?