Abstract
The need for secured data transmission devices is growing in current generation networking meadows. It is very important to process all the transmitted data in a confidential way and maintain integrity by means of congesting other unauthorized users from entering the internal system. However some of the secured devices that are already present in the market cannot be trusted for a long period of time as non-repudiation factors are much higher. As such, in a data processing technique, a device needs to be verified in a complete manner before trusting it. Hence, the proposed method provides possible solutions of verifying a network device before transmitting data. In order to verify the data without difficulty, blockchain procedures are incorporated where no large segments of data are transmitted as fragmentation of data is being processed in the many circumstances. Moreover, the zero trust devices are verified for more time periods, and only if appropriate data processing routes are captured, only the devices are then allowed to transmit. To test further the accuracy of zero trust devices, real-time data outcomes are analyzed under five different scenarios and even congestion is highly reduced in the projected model. Thus, in the comparison case with existing method, the proposed outcome which is enacted with an analytical model proves to be much effective at more than 78%.
More Information
Divisions: | School of Built Environment, Engineering and Computing |
---|---|
Identification Number: | https://doi.org/10.22967/HCIS.2024.14.042 |
Status: | Published |
Refereed: | Yes |
Uncontrolled Keywords: | 0801 Artificial Intelligence and Image Processing; 0805 Distributed Computing; 0806 Information Systems; 4608 Human-centred computing; 4609 Information systems |
SWORD Depositor: | Symplectic |
Depositing User (symplectic) | Deposited by Mann, Elizabeth |
Date Deposited: | 08 Oct 2024 13:51 |
Last Modified: | 08 Oct 2024 14:00 |
Item Type: | Article |
Export Citation
Explore Further
Read more research from the author(s):