4.2 Article

Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery

Journal

SECURITY AND COMMUNICATION NETWORKS
Volume 2021, Issue -, Pages -

Publisher

WILEY-HINDAWI
DOI: 10.1155/2021/5287514

Keywords

-

Ask authors/readers for more resources

Machine-to-machine communication is gaining popularity in various fields such as healthcare and industry. Security and accuracy are key concerns in the implementation of IoT devices. This study proposes a protocol for secure device identification and classification in M2M communication, particularly for telerobotic surgeries.
The capacity of machine objects to communicate autonomously is seen as the future of the Internet of Things (IoT), but machine-to-machine communication (M2M) is also gaining traction. In everyday life, security, transportation, industry, and healthcare all employ this paradigm. Smart devices have the ability to detect, handle, store, and analyze data, resulting in major network issues such as security and reliability. There are numerous vulnerabilities linked with IoT devices, according to security experts. Prior to performing any activities, it is necessary to identify and classify the device. Device identification and classification in M2M for secure telerobotic surgery are presented in this study. Telerobotics is an important aspect of the telemedicine industry. The major purpose is to provide remote medical care, which eliminates the requirement for both doctors and patients to be in the same location. This paper aims to propose a security and energy-efficient protocol for telerobotic surgeries, which is the primary concern at present. For secure telerobotic surgery, the author presents an Efficient Device type Detection and Classification (EDDC) protocol for device identification and classification in M2M communication. The periodic trust score is calculated using three factors from each sensor node. It demonstrates that the EDDC protocol is more effective and secure in detecting and categorizing rogue devices.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available