End-to-end security in embedded system for modern mobile communication technologies

Descripción del Articulo

Modern mobile electronic devices such as smartphones or cell phones can now be used for distant devices such as technical systems to monitor and control. While surveillance systems do not require high standards navigating about the time of transfer of the displayed data. More real-time data are need...

Descripción completa

Detalles Bibliográficos
Autores: Venu, D., Babu, J., Saravanakumar, R., Cosio Borda, Ricardo Fernando, Abd Algani, Yousef Methkal, Kiran Balag, B.
Formato: artículo
Fecha de Publicación:2022
Institución:Universidad Autónoma del Perú
Repositorio:AUTONOMA-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.autonoma.edu.pe:20.500.13067/2029
Enlace del recurso:https://hdl.handle.net/20.500.13067/2029
https://doi.org/10.1016/j.measen.2022.100393
Nivel de acceso:acceso abierto
Materia:IoT
Security
Mobile communication
Privacy
Embedded system
https://purl.org/pe-repo/ocde/ford#5.02.04
id AUTO_dd103b99e7ccfc6e83732567bdb8d78e
oai_identifier_str oai:repositorio.autonoma.edu.pe:20.500.13067/2029
network_acronym_str AUTO
network_name_str AUTONOMA-Institucional
repository_id_str 4774
spelling Venu, D.Babu, J.Saravanakumar, R.Cosio Borda, Ricardo FernandoAbd Algani, Yousef MethkalKiran Balag, B.2022-09-02T18:53:50Z2022-09-02T18:53:50Z2022-07-19https://hdl.handle.net/20.500.13067/2029Measurement: Sensorshttps://doi.org/10.1016/j.measen.2022.100393Modern mobile electronic devices such as smartphones or cell phones can now be used for distant devices such as technical systems to monitor and control. While surveillance systems do not require high standards navigating about the time of transfer of the displayed data. More real-time data are needed for a remote mobile robot transfer. Therefore, it has investigated and measured not only the possibilities of employing mobile devices. But also, the supported data transmission channels, such as UMTS, GSM, Wireless LAN, and Bluetooth. The remotecontrol system is used in many applications such as smart homes, cities, smart hospitals, etc., but it must be today updated to ensure fast-changing technology. Extensive coverage, remote control, and reliable operation in realtime in the deployment of wireless security knowledge. The home automation control system delivers significant features together with a user-friendly interface. A secure remote-based end-to-end security system NTMobile, a technique that enables NAT to provide transverse and encrypted communication from end to end. This confirmed that evaluating the performance of the system in the ECHONET lite compatible smartphone ecosystem. This gives flexibility in configuring time-sensitive industrial networks and enables them to be secured. A safe and reliable remote-control system is also conceivable under the privacy of the user.application/pdfengElsevierinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by-nc-nd/4.0/IoTSecurityMobile communicationPrivacyEmbedded systemhttps://purl.org/pe-repo/ocde/ford#5.02.04End-to-end security in embedded system for modern mobile communication technologiesinfo:eu-repo/semantics/articlehttps://www.sciencedirect.com/science/article/pii/S2665917422000277?via%3Dihub2319reponame:AUTONOMA-Institucionalinstname:Universidad Autónoma del Perúinstacron:AUTONOMAORIGINALEnd-to-end security in embedded system for modern mobile.pdfEnd-to-end security in embedded system for modern mobile.pdfArtículoapplication/pdf4202565http://repositorio.autonoma.edu.pe/bitstream/20.500.13067/2029/1/End-to-end%20security%20in%20embedded%20system%20for%20modern%20mobile.pdf7a51b7997338d07d4265e6c6f28eb7c7MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-885http://repositorio.autonoma.edu.pe/bitstream/20.500.13067/2029/2/license.txt9243398ff393db1861c890baeaeee5f9MD52TEXTEnd-to-end security in embedded system for modern mobile.pdf.txtEnd-to-end security in embedded system for modern mobile.pdf.txtExtracted texttext/plain41483http://repositorio.autonoma.edu.pe/bitstream/20.500.13067/2029/3/End-to-end%20security%20in%20embedded%20system%20for%20modern%20mobile.pdf.txtbf39c8d605f1f3cc9f025ea745f59d41MD53THUMBNAILEnd-to-end security in embedded system for modern mobile.pdf.jpgEnd-to-end security in embedded system for modern mobile.pdf.jpgGenerated Thumbnailimage/jpeg7228http://repositorio.autonoma.edu.pe/bitstream/20.500.13067/2029/4/End-to-end%20security%20in%20embedded%20system%20for%20modern%20mobile.pdf.jpg3121c40f3829aed8990eae6f245a64abMD5420.500.13067/2029oai:repositorio.autonoma.edu.pe:20.500.13067/20292022-09-03 03:00:24.352Repositorio de la Universidad Autonoma del Perúrepositorio@autonoma.pe
dc.title.es_PE.fl_str_mv End-to-end security in embedded system for modern mobile communication technologies
title End-to-end security in embedded system for modern mobile communication technologies
spellingShingle End-to-end security in embedded system for modern mobile communication technologies
Venu, D.
IoT
Security
Mobile communication
Privacy
Embedded system
https://purl.org/pe-repo/ocde/ford#5.02.04
title_short End-to-end security in embedded system for modern mobile communication technologies
title_full End-to-end security in embedded system for modern mobile communication technologies
title_fullStr End-to-end security in embedded system for modern mobile communication technologies
title_full_unstemmed End-to-end security in embedded system for modern mobile communication technologies
title_sort End-to-end security in embedded system for modern mobile communication technologies
author Venu, D.
author_facet Venu, D.
Babu, J.
Saravanakumar, R.
Cosio Borda, Ricardo Fernando
Abd Algani, Yousef Methkal
Kiran Balag, B.
author_role author
author2 Babu, J.
Saravanakumar, R.
Cosio Borda, Ricardo Fernando
Abd Algani, Yousef Methkal
Kiran Balag, B.
author2_role author
author
author
author
author
dc.contributor.author.fl_str_mv Venu, D.
Babu, J.
Saravanakumar, R.
Cosio Borda, Ricardo Fernando
Abd Algani, Yousef Methkal
Kiran Balag, B.
dc.subject.es_PE.fl_str_mv IoT
Security
Mobile communication
Privacy
Embedded system
topic IoT
Security
Mobile communication
Privacy
Embedded system
https://purl.org/pe-repo/ocde/ford#5.02.04
dc.subject.ocde.es_PE.fl_str_mv https://purl.org/pe-repo/ocde/ford#5.02.04
description Modern mobile electronic devices such as smartphones or cell phones can now be used for distant devices such as technical systems to monitor and control. While surveillance systems do not require high standards navigating about the time of transfer of the displayed data. More real-time data are needed for a remote mobile robot transfer. Therefore, it has investigated and measured not only the possibilities of employing mobile devices. But also, the supported data transmission channels, such as UMTS, GSM, Wireless LAN, and Bluetooth. The remotecontrol system is used in many applications such as smart homes, cities, smart hospitals, etc., but it must be today updated to ensure fast-changing technology. Extensive coverage, remote control, and reliable operation in realtime in the deployment of wireless security knowledge. The home automation control system delivers significant features together with a user-friendly interface. A secure remote-based end-to-end security system NTMobile, a technique that enables NAT to provide transverse and encrypted communication from end to end. This confirmed that evaluating the performance of the system in the ECHONET lite compatible smartphone ecosystem. This gives flexibility in configuring time-sensitive industrial networks and enables them to be secured. A safe and reliable remote-control system is also conceivable under the privacy of the user.
publishDate 2022
dc.date.accessioned.none.fl_str_mv 2022-09-02T18:53:50Z
dc.date.available.none.fl_str_mv 2022-09-02T18:53:50Z
dc.date.issued.fl_str_mv 2022-07-19
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/article
format article
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.13067/2029
dc.identifier.journal.es_PE.fl_str_mv Measurement: Sensors
dc.identifier.doi.none.fl_str_mv https://doi.org/10.1016/j.measen.2022.100393
url https://hdl.handle.net/20.500.13067/2029
https://doi.org/10.1016/j.measen.2022.100393
identifier_str_mv Measurement: Sensors
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.relation.url.es_PE.fl_str_mv https://www.sciencedirect.com/science/article/pii/S2665917422000277?via%3Dihub
dc.rights.es_PE.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.es_PE.fl_str_mv https://creativecommons.org/licenses/by-nc-nd/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.format.es_PE.fl_str_mv application/pdf
dc.publisher.es_PE.fl_str_mv Elsevier
dc.source.none.fl_str_mv reponame:AUTONOMA-Institucional
instname:Universidad Autónoma del Perú
instacron:AUTONOMA
instname_str Universidad Autónoma del Perú
instacron_str AUTONOMA
institution AUTONOMA
reponame_str AUTONOMA-Institucional
collection AUTONOMA-Institucional
dc.source.volume.es_PE.fl_str_mv 23
dc.source.beginpage.es_PE.fl_str_mv 1
dc.source.endpage.es_PE.fl_str_mv 9
bitstream.url.fl_str_mv http://repositorio.autonoma.edu.pe/bitstream/20.500.13067/2029/1/End-to-end%20security%20in%20embedded%20system%20for%20modern%20mobile.pdf
http://repositorio.autonoma.edu.pe/bitstream/20.500.13067/2029/2/license.txt
http://repositorio.autonoma.edu.pe/bitstream/20.500.13067/2029/3/End-to-end%20security%20in%20embedded%20system%20for%20modern%20mobile.pdf.txt
http://repositorio.autonoma.edu.pe/bitstream/20.500.13067/2029/4/End-to-end%20security%20in%20embedded%20system%20for%20modern%20mobile.pdf.jpg
bitstream.checksum.fl_str_mv 7a51b7997338d07d4265e6c6f28eb7c7
9243398ff393db1861c890baeaeee5f9
bf39c8d605f1f3cc9f025ea745f59d41
3121c40f3829aed8990eae6f245a64ab
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio de la Universidad Autonoma del Perú
repository.mail.fl_str_mv repositorio@autonoma.pe
_version_ 1835915436536889344
score 13.987529
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).