Improving the security of the organization from the shadow IoT using Blow-fish encryption algorithm
DOI:
https://doi.org/10.31098/ihsatec.v14i1.483Abstract
Smart cities, traffic congestion, waste management, structural health, security, emergency services, logistics, retail, industrial control, and health care are just a few of the applications that the Internet of Things (IoT) can help with. The Internet of Things (IoT) is a mega-technology that can connect to anything, anybody, at any time, place, platform, and network. It has a significant impact on the entire blockchain of enterprises, smart objects, and devices, systems, and services provided by heterogeneous network connection (HNC) and is being developed as a smart pervasive framework for smart devices. Because IoT devices link to complicated equipment, interact with hostile surroundings and are deployed on a variety of unregulated platforms, they confront several security risks and challenges. Because the Internet of Things (IoT) has the capacity to integrate any sort of network or sophisticated system, it may be vulnerable to vulnerabilities inherent in the separate systems that make up the integrated network. The purpose of this research paper is to investigate the security issues that individual systems responsible for IoT interconnection face, as well as their impact on the overall IoT system.Downloads
Published
2022-03-10
How to Cite
Senthilkumar, S., & Murugan, M. (2022). Improving the security of the organization from the shadow IoT using Blow-fish encryption algorithm. Proceedings of The International Halal Science and Technology Conference, 14(1), 29–35. https://doi.org/10.31098/ihsatec.v14i1.483
Issue
Section
Articles