A secure data transmission and efficient data balancing approach for 5G‐based IoT data using UUDIS‐ECC and LSRHS‐CNN algorithms
Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based ellipt...
Saved in:
Published in | IET communications Vol. 16; no. 5; pp. 571 - 583 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Stevenage
John Wiley & Sons, Inc
01.03.2022
Wiley |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based elliptic curve cryptography (UUDIS‐ECC) centred secure data transfer (DT) and linear scaling Rock Hyraxes swarm‐based convolutional neural network (LSRHS‐CNN) centred 5G IoT data balancing are proposed here to address those issues. Authentication, destination selection, validation, secure DT, and also load balancing are the proposed method's five phases. Initially, during the registration phase, the Length Nano ID (LNanoID) is created in the authentication. The user is permitted to further communicate if the LNanoID is matched with the already saved LNanoID. The destination is selected if the user is authorized. Utilizing the sender and the receiver's public key, the hash code is produced in the validation centre by the SiP hash function after destination selection. After that, by employing the UUDIS‐ECC algorithm, the IoT data is safely transmitted towards the destination. The 5G IoT data is balanced by using the LSRHS‐CNN algorithm during DT. Superior results are attained by the proposed methods analogized to existing research methods. |
---|---|
AbstractList | Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based elliptic curve cryptography (UUDIS‐ECC) centred secure data transfer (DT) and linear scaling Rock Hyraxes swarm‐based convolutional neural network (LSRHS‐CNN) centred 5G IoT data balancing are proposed here to address those issues. Authentication, destination selection, validation, secure DT, and also load balancing are the proposed method's five phases. Initially, during the registration phase, the Length Nano ID (LNanoID) is created in the authentication. The user is permitted to further communicate if the LNanoID is matched with the already saved LNanoID. The destination is selected if the user is authorized. Utilizing the sender and the receiver's public key, the hash code is produced in the validation centre by the SiP hash function after destination selection. After that, by employing the UUDIS‐ECC algorithm, the IoT data is safely transmitted towards the destination. The 5G IoT data is balanced by using the LSRHS‐CNN algorithm during DT. Superior results are attained by the proposed methods analogized to existing research methods. Abstract Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based elliptic curve cryptography (UUDIS‐ECC) centred secure data transfer (DT) and linear scaling Rock Hyraxes swarm‐based convolutional neural network (LSRHS‐CNN) centred 5G IoT data balancing are proposed here to address those issues. Authentication, destination selection, validation, secure DT, and also load balancing are the proposed method's five phases. Initially, during the registration phase, the Length Nano ID (LNanoID) is created in the authentication. The user is permitted to further communicate if the LNanoID is matched with the already saved LNanoID. The destination is selected if the user is authorized. Utilizing the sender and the receiver's public key, the hash code is produced in the validation centre by the SiP hash function after destination selection. After that, by employing the UUDIS‐ECC algorithm, the IoT data is safely transmitted towards the destination. The 5G IoT data is balanced by using the LSRHS‐CNN algorithm during DT. Superior results are attained by the proposed methods analogized to existing research methods. |
Author | Alharbi, Yasser Jain, Anurag Yadav, Kusum Ahmed, Nada Mohamed Osman Sid Alkwai, Lulwah M. Alferaidi, Ali Hamad, Sawsan Ali Saad |
Author_xml | – sequence: 1 givenname: Kusum surname: Yadav fullname: Yadav, Kusum organization: University of Ha'il – sequence: 2 givenname: Anurag orcidid: 0000-0001-5155-022X surname: Jain fullname: Jain, Anurag email: anurag.jain@ddn.upes.ac.in organization: University of Petroleum and Energy Studies – sequence: 3 givenname: Yasser surname: Alharbi fullname: Alharbi, Yasser organization: University of Ha'il – sequence: 4 givenname: Ali surname: Alferaidi fullname: Alferaidi, Ali organization: University of Ha'il – sequence: 5 givenname: Lulwah M. surname: Alkwai fullname: Alkwai, Lulwah M. organization: University of Ha'il – sequence: 6 givenname: Nada Mohamed Osman Sid surname: Ahmed fullname: Ahmed, Nada Mohamed Osman Sid organization: University of Ha'il – sequence: 7 givenname: Sawsan Ali Saad surname: Hamad fullname: Hamad, Sawsan Ali Saad organization: University of Ha'il |
BookMark | eNp9kctq3DAYhUVJoLl00ycQdFeYVJIl2V4GN00Gpgk0mbX4dfFEg8eaSjYhu2667zP2SSqPSxalZKXL_51zhM4pOupD7xB6T8kFJbz-ZHYju6CsKOQbdEJLQReVLOTRy55Vb9FpSltChJCcn6Cflzg5M0aHLQyAhwh92vmUfOgx9Ba7tvXGu36Y5xo66I3vNxj2-xjAPOI2RCyuf__4pSE5i5fhYUbHNGHr9eflfR5eNc3Bb3X_7WY6N7e3GLpNiH543KVzdNxCl9y7v-sZWn-5emhuFqu762VzuVoYzplcWCIpOFkxbZhujeWFZGUtCANCiebCEaclJdZyVzgtLGhiKqHbmlLWFhk_Q8vZ1wbYqn30O4jPKoBXh4sQNwri4E3nVFlKwVipayMMr6aYuqykrbjkUEhZZ68Ps1f-h--jS4PahjH2-fmqIDVjNc2xmfo4UyaGlKJrX1IpUVNlaqpMHSrLMPkHNn6AIXeRe_Hd_yV0ljz5zj2_Yq6ar2s2a_4AU3arTA |
CitedBy_id | crossref_primary_10_1177_09287329241291397 crossref_primary_10_1016_j_heliyon_2024_e39306 |
Cites_doi | 10.1109/ICECTA48151.2019.8959607 10.1109/ACCESS.2020.2978525 10.1007/s00521‐020‐05439‐9 10.1016/j.future.2018.04.036 10.1016/j.dcan.2020.05.003 10.1109/JIOT.2020.3024715 10.1007/978-3-030-05481-6_3 10.1016/j.comcom.2020.07.020 10.1007/s12652-017-0602-5 10.1109/NCG.2018.8593105 10.1016/j.dcan.2020.07.003 10.1016/j.avb.2021.101601 10.1504/IJCC.2020.109383 10.1109/JAS.2020.1003189 10.1109/JIOT.2020.3042433 10.1109/JAS.2021.1003820 10.1007/s11277-019-06576-8 10.1016/j.adhoc.2019.101948 10.1109/JAS.2021.1003934 10.1002/dac.4370 10.1109/JIOT.2019.2939204 10.1016/j.future.2019.04.019 10.1016/j.cose.2019.101653 10.1145/2905055.2905199 10.1109/JAS.2020.1003132 10.33166/AETiC.2020.05.004 |
ContentType | Journal Article |
Copyright | 2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology 2022. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology – notice: 2022. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | 24P AAYXX CITATION 8FE 8FG ABJCF AFKRA ARAPS BENPR BGLVJ CCPQU DWQXO HCIFZ L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS S0W DOA |
DOI | 10.1049/cmu2.12336 |
DatabaseName | Wiley Online Library Open Access CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Technology Collection ProQuest One ProQuest Central Korea SciTech Premium Collection ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection DELNET Engineering & Technology Collection DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Engineering Database Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest DELNET Engineering and Technology Collection Materials Science & Engineering Collection ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) Engineering Collection |
DatabaseTitleList | CrossRef Advanced Technologies & Aerospace Collection |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals (WRLC) url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: 24P name: Wiley Online Library Open Access url: https://authorservices.wiley.com/open-science/open-access/browse-journals.html sourceTypes: Publisher – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1751-8636 |
EndPage | 583 |
ExternalDocumentID | oai_doaj_org_article_7765227b9c5c4827959786d8464a3669 10_1049_cmu2_12336 CMU212336 |
Genre | article |
GrantInformation_xml | – fundername: Scientific Research Deanship at the University of Ha'il – Saudi Arabia funderid: RG‐20093 |
GroupedDBID | .DC 0R~ 0ZK 1OC 24P 29I 2QL 4.4 4IJ 5GY 6IK 6OB 8FE 8FG 8VB 96U AAHHS AAHJG AAJGR ABJCF ABQXS ACCFJ ACCMX ACESK ACGFO ACGFS ACIWK ACXQS ADEYR AEEZP AEGXH AENEX AEQDE AFAZI AFKRA AIAGR AIWBW AJBDE ALMA_UNASSIGNED_HOLDINGS ALUQN ARAPS AVUZU BENPR BGLVJ CCPQU CS3 DU5 EBS EJD ESX F8P GOZPB GROUPED_DOAJ GRPMH HCIFZ HZ~ IAO IFIPE IPLJI ITC JAVBF K1G L6V LAI M43 M7S MCNEO MS~ NADUK NXXTH O9- OCL OK1 P62 PTHSS QWB RIE RNS ROL RUI S0W U5U UNMZH ZL0 ~ZZ AAYXX CITATION IDLOA PHGZM PHGZT DWQXO PKEHL PQEST PQGLB PQQKQ PQUKI PRINS WIN PUEGO |
ID | FETCH-LOGICAL-c4426-d061ae682bc2bfcd436279502a010b45e0eb610dd4e3eb5dab0c85bf9112f3d43 |
IEDL.DBID | 24P |
ISSN | 1751-8628 |
IngestDate | Wed Aug 27 01:23:28 EDT 2025 Wed Aug 13 08:53:46 EDT 2025 Tue Jul 01 05:14:39 EDT 2025 Thu Apr 24 22:56:55 EDT 2025 Wed Jan 22 16:25:00 EST 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Language | English |
License | Attribution-NonCommercial-NoDerivs |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c4426-d061ae682bc2bfcd436279502a010b45e0eb610dd4e3eb5dab0c85bf9112f3d43 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-5155-022X |
OpenAccessLink | https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fcmu2.12336 |
PQID | 3092291911 |
PQPubID | 1936360 |
PageCount | 13 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_7765227b9c5c4827959786d8464a3669 proquest_journals_3092291911 crossref_primary_10_1049_cmu2_12336 crossref_citationtrail_10_1049_cmu2_12336 wiley_primary_10_1049_cmu2_12336_CMU212336 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | March 2022 2022-03-00 20220301 2022-03-01 |
PublicationDateYYYYMMDD | 2022-03-01 |
PublicationDate_xml | – month: 03 year: 2022 text: March 2022 |
PublicationDecade | 2020 |
PublicationPlace | Stevenage |
PublicationPlace_xml | – name: Stevenage |
PublicationTitle | IET communications |
PublicationYear | 2022 |
Publisher | John Wiley & Sons, Inc Wiley |
Publisher_xml | – name: John Wiley & Sons, Inc – name: Wiley |
References | 2020; 8 2021; 8 2020; 7 2018; 9 2020; 6 2020; 4 2021; 67 2019; 6 2019; 94 2021 2020 2020; 161 2020; 9 2019 2018 2016 2019; 109 2017; 18 2020; 33 2020; 88 2018; 64 2018; 86 2019; 100 e_1_2_8_28_1 e_1_2_8_29_1 e_1_2_8_24_1 e_1_2_8_25_1 e_1_2_8_26_1 e_1_2_8_27_1 e_1_2_8_3_1 e_1_2_8_2_1 e_1_2_8_5_1 e_1_2_8_7_1 e_1_2_8_6_1 e_1_2_8_9_1 e_1_2_8_8_1 e_1_2_8_20_1 e_1_2_8_21_1 Ramadan R.A. (e_1_2_8_4_1) 2021; 67 e_1_2_8_22_1 e_1_2_8_23_1 e_1_2_8_18_1 Jain A. (e_1_2_8_17_1) 2017; 18 e_1_2_8_19_1 e_1_2_8_13_1 e_1_2_8_14_1 e_1_2_8_15_1 e_1_2_8_16_1 e_1_2_8_10_1 e_1_2_8_11_1 e_1_2_8_12_1 e_1_2_8_30_1 |
References_xml | – volume: 4 start-page: 61 issue: 5 year: 2020 end-page: 74 article-title: A novel hybrid intrusion detection system (IDS) for the detection of Internet of things (IoT) network attacks publication-title: Ann. Emerg. Technol. Comput. – volume: 18 start-page: 213 issue: 3‐4 year: 2017 end-page: 234 article-title: Critical analysis of load balancing strategies for cloud environment publication-title: Int. J. Commun. Netw. Distrib. Syst. – volume: 8 start-page: 8119 issue: 10 year: 2020 end-page: 8132 article-title: Secure and optimized load balancing for multi‐tier IoT and edge‐cloud computing systems publication-title: IEEE IoT J. – volume: 67 start-page: 3563 issue: 3 year: 2021 end-page: 3579 article-title: LBC‐IoT: Lightweight block cipher for IoT constraint devices publication-title: Comput. Mater. Con. – start-page: 1 year: 2019 end-page: 5 article-title: 5G wireless communications: Future technologies and research challenges – volume: 94 start-page: 1 year: 2019 end-page: 13 article-title: Enhanced authentication and key management scheme for securing data transmission in the internet of things publication-title: Ad Hoc Netw. – volume: 9 start-page: 1267 issue: 4 year: 2018 end-page: 1273 article-title: IoT device security based on proxy re‐encryption publication-title: J. Ambient Intell. Hum. Comput. – volume: 109 start-page: 505 issue: 1 year: 2019 end-page: 519 article-title: Practical data transmission scheme for wireless sensor networks in heterogeneous IoT environment publication-title: Wirel. Pers. Commun. – volume: 9 start-page: 311 issue: 2‐3 year: 2020 end-page: 329 article-title: An IoT‐based secure data transmission in WBSN publication-title: Int. J. Cloud Comput. – volume: 6 start-page: 253 issue: 3 year: 2020 end-page: 260 article-title: Service aware 5G: An intelligent and open network based on convergence of communication, computing and caching publication-title: Digit. Commun. Netw. – volume: 33 start-page: 1 issue: 8 year: 2020 end-page: 19 article-title: A new fuzzy‐based method for load balancing in the cloud‐based internet of things using a grey wolf optimization algorithm publication-title: Int. J. Commun. Syst. – volume: 8 start-page: 5141 issue: 7 year: 2020 end-page: 5148 article-title: Towards 5G architecture for energy efficient communication in IoT‐enabled smart automation systems publication-title: IEEE IoT J. – volume: 8 start-page: 848 issue: 4 year: 2021 end-page: 865 article-title: Task scheduling for multi‐cloud computing subject to security and reliability constraints publication-title: IEEE/CAA J. Autom. Sin. – volume: 64 start-page: 34 year: 2018 end-page: 46 article-title: Secure data transmission scheme based on elliptic curve cryptography for internet of things publication-title: International Symposium on Modelling and Implementation of Complex Systems – volume: 7 start-page: 683 issue: 3 year: 2020 end-page: 692 article-title: Deep learning and time series‐to‐image encoding for financial forecasting publication-title: IEEE/CAA J. Autom. Sin. – start-page: 1 year: 2018 end-page: 5 article-title: Efficient data classification for IoT devices using AWS Kinesis platform – volume: 7 start-page: 1204 issue: 5 year: 2020 end-page: 1214 article-title: A resilient control strategy for cyber‐physical systems subject to denial of service attacks: A leader‐follower set‐theoretic approach publication-title: IEEE/CAA J. Autom. Sin. – volume: 86 start-page: 527 year: 2018 end-page: 534 article-title: Cloud and IoT based disease prediction and diagnosis system for healthcare using fuzzy neural classifier publication-title: Future Gener. Comput. Syst. – start-page: 1 year: 2020 end-page: 10 article-title: Analysis of complex cognitive task and pattern recognition using distributed patterns of EEG signals with cognitive functions publication-title: Neural Comput. Appl. – year: 2020 – volume: 8 start-page: 319 issue: 2 year: 2021 end-page: 333 article-title: Physical safety and cyber security analysis of multi‐agent systems: A survey of recent advances publication-title: IEEE/CAA J. Autom. Sin. – year: 2021 article-title: Big data and ambient intelligence in IoT‐based wireless student health monitoring system publication-title: Aggress. Violent Behav. – volume: 8 start-page: 67192 year: 2020 end-page: 67204 article-title: A lightweight privacy‐preserving communication protocol for heterogeneous IoT environment publication-title: IEEE Access – volume: 100 start-page: 882 year: 2019 end-page: 892 article-title: Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme publication-title: Future Gener. Comput. Syst. – volume: 6 start-page: 281 issue: 3 year: 2020 end-page: 291 article-title: Security and privacy in 5G networks: New areas and new challenges publication-title: Digit. Commun. Netw. – volume: 6 start-page: 10431 issue: 6 year: 2019 end-page: 10440 article-title: Provably secure and generalized signcryption with public verifiability for secure data transmission between resource‐constrained IoT devices publication-title: IEEE IoT J. – start-page: 1 year: 2016 end-page: 6 article-title: Confidentiality enhanced security model for cloud environment – volume: 88 start-page: 1 year: 2020 end-page: 37 article-title: PrivySharing: A blockchain‐based framework for privacy‐preserving and secure data sharing in smart cities publication-title: Comput. Secur. – volume: 161 start-page: 248 year: 2020 end-page: 256 article-title: Blockchain based integrated security measure for reliable service delegation in 5G communication environment publication-title: Comput. Commun. – ident: e_1_2_8_15_1 doi: 10.1109/ICECTA48151.2019.8959607 – ident: e_1_2_8_10_1 doi: 10.1109/ACCESS.2020.2978525 – ident: e_1_2_8_14_1 – ident: e_1_2_8_23_1 doi: 10.1007/s00521‐020‐05439‐9 – ident: e_1_2_8_27_1 doi: 10.1016/j.future.2018.04.036 – ident: e_1_2_8_12_1 doi: 10.1016/j.dcan.2020.05.003 – ident: e_1_2_8_13_1 doi: 10.1109/JIOT.2020.3024715 – ident: e_1_2_8_24_1 doi: 10.1007/978-3-030-05481-6_3 – ident: e_1_2_8_21_1 doi: 10.1016/j.comcom.2020.07.020 – ident: e_1_2_8_11_1 doi: 10.1007/s12652-017-0602-5 – ident: e_1_2_8_5_1 doi: 10.1109/NCG.2018.8593105 – ident: e_1_2_8_16_1 doi: 10.1016/j.dcan.2020.07.003 – ident: e_1_2_8_26_1 doi: 10.1016/j.avb.2021.101601 – ident: e_1_2_8_29_1 doi: 10.1504/IJCC.2020.109383 – ident: e_1_2_8_6_1 doi: 10.1109/JAS.2020.1003189 – ident: e_1_2_8_28_1 doi: 10.1109/JIOT.2020.3042433 – ident: e_1_2_8_3_1 doi: 10.1109/JAS.2021.1003820 – ident: e_1_2_8_8_1 doi: 10.1007/s11277-019-06576-8 – volume: 18 start-page: 213 issue: 3 year: 2017 ident: e_1_2_8_17_1 article-title: Critical analysis of load balancing strategies for cloud environment publication-title: Int. J. Commun. Netw. Distrib. Syst. – ident: e_1_2_8_9_1 doi: 10.1016/j.adhoc.2019.101948 – ident: e_1_2_8_18_1 doi: 10.1109/JAS.2021.1003934 – ident: e_1_2_8_19_1 doi: 10.1002/dac.4370 – ident: e_1_2_8_25_1 doi: 10.1109/JIOT.2019.2939204 – ident: e_1_2_8_22_1 doi: 10.1016/j.future.2019.04.019 – volume: 67 start-page: 3563 issue: 3 year: 2021 ident: e_1_2_8_4_1 article-title: LBC‐IoT: Lightweight block cipher for IoT constraint devices publication-title: Comput. Mater. Con. – ident: e_1_2_8_20_1 doi: 10.1016/j.cose.2019.101653 – ident: e_1_2_8_2_1 doi: 10.1145/2905055.2905199 – ident: e_1_2_8_30_1 doi: 10.1109/JAS.2020.1003132 – ident: e_1_2_8_7_1 doi: 10.33166/AETiC.2020.05.004 |
SSID | ssj0055644 |
Score | 2.3029215 |
Snippet | Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data... Abstract Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with... |
SourceID | doaj proquest crossref wiley |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 571 |
SubjectTerms | Access control Access to information Algorithms Artificial neural networks Authentication Automation Blockchain Communications systems Computer networks Confidentiality Curves Data encryption Data transfer (computers) Data transmission Digital signatures Efficiency Hash based algorithms Internet of Things Multimedia communications Network security Privacy Protocol Quality of service Sensors Spatial data |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELYQEwyIpygvWYIFpEDr2E4ylggoCDoAldgsvwJI0CLa7izs_EZ-CXdOAkVCsLAl8SWyfLa_75zzZ0J2Yl9YK7mMYKCJiAuYBzXnPkq0SQrvEls43Ch80ZWdHj-7ETcTR31hTlgpD1w23EGSSKAIicmssChZmQEDTqUD2OQ6ljJs3QPMq4Opcg4WQoZjXAEbWxFw9rQWJuXZgX0cs32Yr4Mo8xcUBcX-bzRzkqwGtDmeJ3MVTaTtsnoLZMr3F8nshHjgEnlt0yEulnuKWZ50hKADTsPVL6r7jvogDgGYUpYbzGG08CatZcQp8FUqTt5f3hDKHD0dXJemmAt_S3tAFa-g8CjPw_fOry47eJ93u1Q_3A6e70d3j8Nl0js-us47UXWoQmQ5oHHkAMC1lykzlpnCOg4IBo3aZBoiM8OFb3oDlMo57mNvhNOmaVNhCpgUWRGD-QqZ7g_6fpVQDcFXLIyQ1qEkDZAL7tPYM-1b2sL3GmS3bl9lK8VxPPjiQYU_3zxT6AsVfNEg25-2T6XOxo9Wh-imTwvUxg4PoMeoqseov3pMg2zUTlbVgB2quJkxlkHw2mqQveD4X6qh8oseC1dr_1GhdTLDcFNFyGzbINOj57HfBKozMluhV38Ah0b4RQ priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT-MwELZYuOweELCLKC9ZgssiBVrHdpITgqhQEFQIqMTN8ivlAC3QcufCnd_IL2HGdXhIiFseEyvKxPN940y-IWQz9ZW1kssEJppIuIA4qDn3SaZNVnmX2crhj8KnXdnp8eMrcRUX3EaxrLKOiSFQu6HFNfKdtFkwVkB20dq9u0-waxR-XY0tNH6RGQjBOSRfM_vt7tl5HYuFkKGdK2BkKwHuntcCpbzYsbePbBvidhBn_oCkoNz_hW5-Jq0BdQ7myGyki3Rv4t95MuUHC-TPJxHBv-R5j45w0dxTrPakYwQfcB6uglE9cNQHkQjAlsl5g7WMFq6ktZw4Bd5KxeHr0wtCmqNHw8uJKdbE92kPKOMFnGyXZRjv5OK8g_tlt0v1TR-e0fj6dvSP9A7al2Unic0VEssBlRMHQK69zJmxzFTWcUCyrBBNpiFDM1z4pjdArZzjPvVGOG2aNhemAgewKgXzRTI9GA78EqEakrBUGCGtQ2kaIBnc56ln2re0hfEa5H_9fJWNyuPYAONGhS_gvFDoCxV80SAb77Z3E72Nb6320U3vFqiRHQ4MH_oqTjmVZRLIZWYKKyyKnRaQO-XSAeHiOpWyaJDV2skqTtyR-njNGmQrOP6H21DlaY-FreWfx1ohvxn-NhFq11bJ9Pjh0a8BmRmb9fjGvgFLSvNQ priority: 102 providerName: ProQuest |
Title | A secure data transmission and efficient data balancing approach for 5G‐based IoT data using UUDIS‐ECC and LSRHS‐CNN algorithms |
URI | https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fcmu2.12336 https://www.proquest.com/docview/3092291911 https://doaj.org/article/7765227b9c5c4827959786d8464a3669 |
Volume | 16 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3Pa9swFH507WU7lO4XS9cFQXfZwFsiS7INvbQmaTbWUNoGehP65WzQJiNJ77vs3r-xf8nek-2shTHoxdjWkzB-fu_7JEufAN6noXJOCZVgoMlESMyDRoiQZMZmVfCZqzwtFD4Zq9FEfL2Ulxtw0K6FqfUh1gNuFBkxX1OAG1vvQoKkFp3orm_4J8y7qXoCW7S2lpTzuTht87CUKm7livjYT5C35604qSg-_637AI6iav8DqnmfsEbEGe7AdkMV2WHt2-ewEWYv4Nk9AcGX8PuQLWnAPDCa6clWBDzoOBoBY2bmWYgCEYgrdbmleYwOa7JWSpwhZ2Xy-O7XLcGZZ1_mF7UpzYefsgnSxXMsHJRlbO_b-dmIrsvxmJmr6XzxY_X9evkKJsPBRTlKmo0VEicQkROPIG6Cyrl13FbOC0SxrJA9brB3ZoUMvWCRVnkvQhqs9Mb2XC5thYmRVymav4bN2XwW3gAz2AFLpZXKeZKlQYIhQp4GbkLfOGyvAx_a96tdozpOm19c6fj3WxSafKGjLzqwv7b9WWtt_NPqiNy0tiB97HhjvpjqJtx0likklpktnHQkdFpgvylXHsmWMKlSRQf2WifrJmiXOu0VnBfYge134GN0_H8eQ5cnEx7Pdh9j_BaeclpAEWex7cHmanET3iGtWdlu_HrxmA-Pu7B1NBifnnXjEMEfHpf2LA |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtNAEB6VcgAOiF8RKLAScADJNFnvru0DQsU0TWiSA02k3rb753Bok9KkQty4cOdJeCiehJl13BYJ9dZbHI_Xlmd25pv17DcAL9NQOaeESnCiyURI9INGiJBkxmZV8JmrPG0UHo5UbyI-7cv9Nfjd7IWhssrGJ0ZH7eeO1sg303bBeYHZRef98deEukbR19WmhUZtFrvh-zdM2Rbv-h9Rv684726Py16y6iqQOIHhKPEYwUxQObeO28p5gS48K2SbG0xNrJChHSxiCu9FSIOV3ti2y6Wt8M68SlEcx70G10WaFjSj8u5O4_mlVLF5LEbkToKZQt7QoYpi0x2d8rcYJSIV9HkAjH0C_gG3FyFyjHHdO3B7BU7ZVm1Nd2EtzO7BrQuUhffh5xZb0BJ9YFRbypYU6tBUaM2NmZlnIVJSYCSrz1uqnHR4JWvIyxmiZCZ3_vz4RQHUs_58XItSBf6UTRCg7uHJ7bKM4w32PvfouByNmDmcokaWX44WD2ByJS_9IazP5rPwCJjBlC-VVirniQgHIY0IeRq4CR3jcLwWvG7er3YrnnNqt3Go4_d2UWjShY66aMGLM9njmt3jv1IfSE1nEsTIHf-Yn0z1aoLrLFMIZTNbOOmIWrXATC1XHuGdMKlSRQs2GiXrlZtY6HOjbsGbqPhLHkOXwwmPvx5fPtZzuNEbDwd60B_tPoGbnDZsxKq5DVhfnpyGpwijlvZZtF0GB1c9Wf4CYU8u7w |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9NAEB2VVEJwQHyKQIGVgANIJs56d20fEGrdhIS2VtU2Um_Lfjkc2qQ0qRA3Ltz5Pfwcfgmza7stEuqttySerCzP7L4369k3AK8SVxkjmIhwovGIcVwHFWMuSpVOK2dTU1l_UHinFKMJ-3TID1fgd3sWxpdVtmtiWKjt3Pg98l4S55TmmF30e1VTFrG7Ofxw8jXyHaT8m9a2nUYdIlvu-zdM3xbvx5vo69eUDgcHxShqOgxEhiE0RRbRTDmRUW2oroxluJynOY-pwjRFM-5ip5FfWMtc4jS3Sscm47rCu6BVguY47g1YTTErijuwujEod_daHOBchFayiM_9CPOGrBVHZXnPHJ_Rd4gZQRj6Ag5D14B_qO5lwhwQb3gX7jRUlazXsXUPVtzsPty-JGD4AH6uk4XfsHfEV5qSpQc-DBy_A0fUzBIXBCoQ1-rr2tdRGvwnaaXMCXJmwj_--fHLw6kl4_lBberr8adkgnR1Hy8OiiKMt72_N_Lfi7Ik6miKPll-OV48hMm1PPZH0JnNZ-4xEIUJYMI1F8Z6WRwkOMxliaPK9ZXB8brwpn2-0jSq5775xpEMb99ZLr0vZPBFF16e257UWh__tdrwbjq38Prc4Yf56VQ2012mqUBim-rccOOFVnPM2zJhkewxlQiRd2GtdbJsFo2FvAjxLrwNjr_iNmSxM6Hh05Orx3oBN3GiyO1xufUUblF_eiOU0K1BZ3l65p4hp1rq503wEvh83fPlL4fmNIE |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+secure+data+transmission+and+efficient+data+balancing+approach+for+5G%E2%80%90based+IoT+data+using+UUDIS%E2%80%90ECC+and+LSRHS%E2%80%90CNN+algorithms&rft.jtitle=IET+communications&rft.au=Yadav%2C+Kusum&rft.au=Jain%2C+Anurag&rft.au=Alharbi%2C+Yasser&rft.au=Alferaidi%2C+Ali&rft.date=2022-03-01&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=16&rft.issue=5&rft.spage=571&rft.epage=583&rft_id=info:doi/10.1049%2Fcmu2.12336&rft.externalDBID=n%2Fa&rft.externalDocID=10_1049_cmu2_12336 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon |