International Journal of Engineering Technology and Computer Research
https://www.ijetcr.org/index.php/ijetcr
<p> </p> <p><strong style="font-size: 14px; font-family: 'lucida sans unicode', 'lucida grande', sans-serif; text-align: justify;">International Journal of Engineering Technology and Computer Research (IJETCR) is a full-text database of OJS journal</strong></p> <p style="text-align: justify;"><span style="font-family: 'lucida sans unicode', 'lucida grande', sans-serif;">IJETCR is International publisher of academic and research journals; IJETCR publishes and develops titles in groups with the world's most prestigious learned societies and publishers. Our goal is to bring high quality research work</span></p> <hr> <p style="text-align: justify;"><span style="font-family: lucida sans unicode,lucida grande,sans-serif;"><span style="font-size: 14px;"><strong>Aims and Scope </strong></span></span></p> <p style="text-align: justify;"><span style="font-family: 'lucida sans unicode', 'lucida grande', sans-serif;">International Journal of Engineering Technology and Computer Research (IJETCR) is an Open Access, international, multidisciplinary journals hub in the field multi disciplinary and will publish original research papers, short communications, invited reviews, Case studies and editorial commentary and news, Opinions & Perspectives and Book Reviews written at the invitation of the Editor in following fields</span></p> <hr> <p style="text-align: justify;"><span style="font-family: lucida sans unicode,lucida grande,sans-serif;"><span style="font-size: 14px;"><strong>Important Notice</strong></span></span></p> <p style="text-align: justify;"><span style="font-family: 'lucida sans unicode', 'lucida grande', sans-serif;">Authors can now directly send their manuscript as an email attachment to editor@ijetcr.org </span></p> <p style="text-align: justify;"><span style="font-family: lucida sans unicode,lucida grande,sans-serif;">All manuscripts are subject to rapid peer review. Those of high quality (not previously published and not under consideration for publication in another journal) will be published without delay. First-time users are required to register themselves as an author before making submissions by signing up the author registration form at journals website: </span><span style="font-size: 14px; font-family: 'lucida sans unicode', 'lucida grande', sans-serif;">www. http://ijetcr.org</span></p> <p style="text-align: justify;"><span style="font-family: 'lucida sans unicode', 'lucida grande', sans-serif;">With the online journal management system that we are using, authors will be able to track manuscripts progress through the editorial process by logging in as author in authors Dashboard.</span></p> <hr> <p style="text-align: justify;"><span style="font-family: lucida sans unicode,lucida grande,sans-serif;"><span style="font-size: 14px;"><strong>Top Reasons for publication with us</strong></span></span></p> <hr> <p style="text-align: justify;"><strong style="font-family: 'lucida sans unicode', 'lucida grande', sans-serif;">Quick Quality Review:</strong><span style="font-family: 'lucida sans unicode', 'lucida grande', sans-serif;"> The journal has strong international team of editors and reviewers, Rapid Decision and Publication</span></p> <hr> <p style="text-align: justify;"><strong style="font-family: 'lucida sans unicode', 'lucida grande', sans-serif;">Very Low Publication Fees:</strong><span style="font-family: 'lucida sans unicode', 'lucida grande', sans-serif;"> Comparable journals charge a huge sum for each accepted manuscript. IJETCR only charge the fees necessary to recoup cost associated with running the journal</span></p> <hr> <p style="text-align: justify;"><strong style="font-family: 'lucida sans unicode', 'lucida grande', sans-serif;">Other features:</strong><span style="font-family: 'lucida sans unicode', 'lucida grande', sans-serif;"> DIDS // DOI - Assigned and Implemented the Open Review System (ORS).</span></p> <hr> <p> </p>INNOVATIVE LIBRARYen-USInternational Journal of Engineering Technology and Computer Research2348-2117<p><img style="border-width: 0;" src="http://i.creativecommons.org/l/by/4.0/88x31.png" alt="Creative Commons License" width="60" height="21" border="0"><strong>International Journal of Engineering </strong><strong>Technology and Computer Research (IJETCR) </strong><span style="line-height: 1.3em;">by </span><span style="line-height: 1.3em;">Articles</span><span style="line-height: 1.3em;"> is licensed under a </span><a style="line-height: 1.3em;" title="Journal of Biomedical and Pharmaceutical Research" href="http://creativecommons.org/licenses/by/4.0/" target="_blank" rel="license noopener">Creative Commons Attribution 4.0 International License</a><span style="line-height: 1.3em;">.</span></p>REVIEW OF IOT SECURITY CHALLENGES AND EXISTING SOLUTIONS
https://www.ijetcr.org/index.php/ijetcr/article/view/568
<p>As Internet of Things applications continue to develop, there are increasing threats to them. It is extremely difficult to create a fully secure system because of the restricted resources in these networks. This study looks at the different security needs and potential IoT attack. The study examines current methods for securing IoT systems, including blockchain, fog/edge computing, and machine intelligence. This paper aims to find out the current developments in the field of IoT security. To enhance security of IoT systems, this review looked at a variety of security criteria and current approaches. This thorough analysis of the most recent papers related to security of IoT has shown new research trends that will likely shape this sector's future.</p> <p>Keywords: Internet of Things, Blockchain, Machine Learning, Deep Learning, Fog Computing, Edge Computings</p> <p> </p>Muskan GargSima .
Copyright (c) 2024
http://creativecommons.org/licenses/by/4.0
2024-03-102024-03-10121111WIRELESS SENSOR NETWORK SECURITY ISSUES and ATTACKS
https://www.ijetcr.org/index.php/ijetcr/article/view/569
<p>Wireless Sensor Networks (WSNs) offer numerous advantages in various applications such as environmental monitoring, healthcare, industrial automation, and smart infrastructure. WSNs, although beneficial in numerous applications, are vulnerable to attacks due to their distributed nature and resource constraints. Mitigating these threats requires a combination of cryptographic techniques, secure protocols, intrusion detection systems, and resilient network architectures tailored to the unique characteristics of WSNs. This study focuses on security challenges and solutions for Wireless Sensor Networks (WSNs) addressing vulnerabilities to ensure reliability and trust:</p> <p><strong>Keywords:</strong> Wireless sensor networks (WSNs), Security, Intrusion detection, Security Protocols</p> <p> </p>Muskan Garg
Copyright (c) 2024
http://creativecommons.org/licenses/by/4.0
2024-03-102024-03-101211218Securing Cloud Infrastructure: Leveraging Fog Computing for Enhanced Protection
https://www.ijetcr.org/index.php/ijetcr/article/view/570
<p>In essence, a cloud is a collection of several dedicated servers connected by a network. A network-based environment called "cloud computing" is centered on resource or computation sharing. Customers just pay for the resources they use in the cloud; they are not required to pay for local resources like infrastructure or storage. Thus, this is the primary benefit of cloud computing and the primary cause for its increasing popularity in the modern world. Because it may lower processing costs while enhancing the flexibility and scalability of computer processes, cloud computing is also one of the most exciting technological advancements. However, security is the primary issue that arises with clouds. Furthermore, security and privacy are currently the two key issues that need to be taken into account. We are developing a new technology called fog computing to address the security issue. By offering security within the cloud environment, fog computing simply expands on cloud computing rather than replacing it. We can improve the cloud experience by separating user data that must reside on the edge with Fog services. Fog computing's primary goal is to put the data close to the consumer</p> <p> </p>Sweety .
Copyright (c) 2024
http://creativecommons.org/licenses/by/4.0
2024-03-132024-03-131212224