This paper is published in Volume-4, Issue-6, 2018
Area
Datamining
Author
Meena J., P. Balamurugan, P. Gayathri Devi
Org/Univ
Sengunthar Arts and Science College, Namakkal, Tamil Nadu, India
Keywords
Stream, Classification, Big Data, Sensor data, Stream, Manager, IoT, Encryption model
Citations
IEEE
Meena J., P. Balamurugan, P. Gayathri Devi. Improved selective encryption method for IOT-BSN using stream classification adaptive model, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Meena J., P. Balamurugan, P. Gayathri Devi (2018). Improved selective encryption method for IOT-BSN using stream classification adaptive model. International Journal of Advance Research, Ideas and Innovations in Technology, 4(6) www.IJARIIT.com.
MLA
Meena J., P. Balamurugan, P. Gayathri Devi. "Improved selective encryption method for IOT-BSN using stream classification adaptive model." International Journal of Advance Research, Ideas and Innovations in Technology 4.6 (2018). www.IJARIIT.com.
Meena J., P. Balamurugan, P. Gayathri Devi. Improved selective encryption method for IOT-BSN using stream classification adaptive model, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Meena J., P. Balamurugan, P. Gayathri Devi (2018). Improved selective encryption method for IOT-BSN using stream classification adaptive model. International Journal of Advance Research, Ideas and Innovations in Technology, 4(6) www.IJARIIT.com.
MLA
Meena J., P. Balamurugan, P. Gayathri Devi. "Improved selective encryption method for IOT-BSN using stream classification adaptive model." International Journal of Advance Research, Ideas and Innovations in Technology 4.6 (2018). www.IJARIIT.com.
Abstract
This paper describe a Stream Classification Adaptive Model (SCAM) technique for securing massive sensing information streams that meets multiple levels of confidentiality and integrity. This SCAM technique includes two vital concepts: common shared keys that area unit initialized and updated by D-SM while not requiring retransmission and a seam-less key stimulant method while not break off the data-stream encryption/decryption. Moreover, a replacement theme is planned to secure a big data sensor protocol through the employment of multiple unidirectional hash chains. The theme is shown to be lower in machine, power utilization. Also, communication prices area unit nevertheless still ready to secure Big Data Sensor communication model.