1Project Manager, Mercedes Benz Research and Development India Pvt. Ltd., Bangalore, Karnataka, India.
2Associate Professor, Department of Computer Science and Engineering, SAGE University, Bhopal, Madhya Pradesh, India.
3Associate Professor, Department of EEE, Sona College of Technology, Salem, Tamil Nadu, India.
4Assistant Professor, Department of Electrical and Computer Engineering, Madda
Walabu University, Madda Walabu University, Bale Robe, Ethiopia.
5Lecturer and Head, Department of Electrical and Computer Engineering, Madda Walabu
University, Madda Walabu University, Bale Robe, Ethiopia.
6Associate Professor, Department of Computer Science and Engineering, Sri Eshwar
College of Engineering, Coimbatore, Tamil Nadu, India.
Correspionding author email: email@example.com
Article Publishing History
Accepted After Revision: 17/07/2021
The conventional methods restricts the number of transactions which enters the global SVM-GMM by implementing a scalable local ledger, but compromising on the peer validation of transactions at local and global level. In this paper, we analyse the security of IoT using privacy based algorithm. It aims at studying the block chain as a potential solution to secure IoT data management within supply chains in Telehealth. It integrate privacy based algorithm for data management that includes: collection, validation, storage and analysis. The study integrates security algorithm in IoT devices using a closed-loop model, which is developed to address the security related concerns in IoT devices in supply chain. The validation shows that the proposed security protocol offers improved data privacy and integrity than the other security mechanisms.
SVM-GMM, Iot, Privacy Based Algorithm, Closed-Loop Model