Meet Inspiring Speakers and Experts at our 3000+ Global Conference Series LLC LTD Events with over 1000+ Conferences, 1000+ Symposiums
and 1000+ Workshops on Medical, Pharma, Engineering, Science, Technology and Business.

Explore and learn more about Conference Series LLC LTD : World’s leading Event Organizer


International Conference on Artificial Intelligence, Robotics & IoT

Paris, France

Joy Chen

Joy Chen

Da-Yeh University, Taiwan

Title: Apply the MRC/SC Schemes and Belief Propagation Algorithm to TM in the Deployment of IoT System


Biography: Joy Chen


To govern the interaction and the development of applications over the IoT (internet of things) environment without considering the security is still a concerned issue nowadays. The study on huge of security issues relevant to the application layer of IoT is becoming urgently. On the other hand, it is important for addressing the development of security algorithm to protect the IoT system from malicious attack. In this article, a fusion diversity scheme adopts both MRC (maximum ratio combining) and SC (selection combining) schemes with BF (belief propagation) algorithm are proposed. In MRC stage, specified parameters first extracted and before combined with the control information they weighted by one estimation value. The fused information results from MRC forward to the SC to generate the final trust value for making the decision. However, there is a final stage of BF adopted as the role provides with a guaranteed QoS over IoT architecture. The simulation results from experiments deployed with physical assessment show that the security has more reliability after the fusion of MRC/SC schemes and BP (belief propagation) algorithm for the TM procedure. In fact, there are many existing traditional solutions developed to count different attacks for the computer network or for each layer of the internet. For example, the encryption of information used for confidentiality and there are many other most popular cipher algorithms, such as RSA (Rivest Shamir Adleman), ECC (error correlation code), AES (advanced encryption standard), 3DES (triple data encryption algorithm). Based on the aforementioned points that motivates the paper propose an algorithm to fuse the scheme of TM with a famous linear diversity method, MRC (maximum ratio combining), for IoT security. The proposed fusion diversity scheme is more reliable in terms of security validated by the simulation. Alternatively, the reducing QoS degree for the requester is the penalty.