过去一年中添加的文章,按日期排序

Trust management in the internet of vehicles: a systematic literature review of blockchain integration

S Abbasi, N Khaledian, AM Rahmani - … Journal of Information Security, 2024 - Springer
7 天前 - Existing solutions, often dependent on specific environments and protocols, struggle
to address these issues … of blockchain technology to address these challenges. We argue …

Efficient Secure Inference Scheme in Multiparty Settings for Industrial Internet of Things

J Lin, Y Miao, L Wei, T Leng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
12 天前 - … To solve the above two issues, we propose a multiparty secure inference scheme
Technical Overview To achieve efficiency and security, we use two new protocols in …

[PDF][PDF] Towards Scalable Architectures in oneM2M-based Interoperability deployments in Smart Cities

VJS Pranavasri - 2024 - web2py.iiit.ac.in
14 天前 - security within real-world smart city deployments. This contribution is pivotal for the
IoT field, challenging the status quo of existing … and technological advancements continue to …

Security and privacy in IoT-based Smart Farming: a review

IA Ali, WA Bukhari, M Adnan, MI Kashif… - Multimedia Tools and …, 2024 - Springer
17 天前 - protocol and encryption features that it will support. This can then always be updated
by new technological advancements or altered security … of security issues and challenges

An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking

AK Rao, KK Nagwanshi, MK Shukla - Peer-to-Peer Networking and …, 2024 - Springer
21 天前 - … that enhances the efficiency, security, and resilience of … evolving landscape of
agricultural technology, fostering … challenges of energy efficiency, scalability, and security in …

Pseudonym Revocation System for Iot-Based Medical Applications

N Bermad - Available at SSRN 4865840 - papers.ssrn.com
23 天前 - security and privacy issues are paramount concerns in the realm of medical IoT
technology… For the continuity of this work, we aim to extend our privacy protocol by incorporating …

Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization

SJ Patil, LS Admuthe, AS Patil, SR Prasad - Smart Science, 2024 - Taylor & Francis
32 天前 - technology where each node functions as a source, destination, or intermediary
router. However, existing techniques fail to adequately address security … these challenges, this …

AI-based anomaly identification techniques for vehicles communication protocol systems: Comprehensive investigation, research opportunities and challenges

H Ahmad, MM Gulzar, S Aziz, S Habib, I Ahmed - Internet of Things, 2024 - Elsevier
37 天前 - … as a communication technology is becoming more … strategy against vehicle data
security breach by the hackers. … AIS in conventional information technology systems (ITSs) is …

Secure-key management protocols for wireless sensor networks in Internet of Things

K Srinivas, K Sagar - AIP Conference Proceedings, 2024 - pubs.aip.org
37 天前 - … asymmetric key technology on sensor systems. The majority of the difficult challenge
here … which provides IoT services with security protocols. In this way, a user may utilise the …

A Novel Approach of Lora-Wan Based Robot for Detecting and Killing Weeds

A Atri, H Atri - Available at SSRN 4853424 - papers.ssrn.com
38 天前 - security have become crucial requirements for human society. Artificial intelligence
technology … areas without access to the internet or telecommunications is challenging. A cost-…