Autonomous vehicles and intelligent automation: Applications, challenges, and opportunities
Intelligent Automation (IA) in automobiles combines robotic process automation and artificial
intelligence, allowing digital transformation in autonomous vehicles. IA can completely …
intelligence, allowing digital transformation in autonomous vehicles. IA can completely …
[Retracted] Blockchain‐Based Trust Management Framework for Cloud Computing‐Based Internet of Medical Things (IoMT): A Systematic Review
The internet of medical things (IoMT) is a smart medical device structure that includes apps,
health services, and systems. These medical equipment and applications are linked to …
health services, and systems. These medical equipment and applications are linked to …
Security requirements for the internet of things: A systematic approach
S Pal, M Hitchens, T Rabehaja, S Mukhopadhyay - Sensors, 2020 - mdpi.com
There has been a tremendous growth in the number of smart devices and their applications
(eg, smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday …
(eg, smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday …
Security trends in Internet of Things: A survey
Abstract The Internet of Things (IoT) is a network of embedded devices that are uniquely
identifiable and have embedded software required to communicate between the transient …
identifiable and have embedded software required to communicate between the transient …
Blockchain-based framework for secure and reliable land registry system
The land registry system is one of the very important department in any governance system
that stores the records of land ownership. There are various issues and loopholes in the …
that stores the records of land ownership. There are various issues and loopholes in the …
Self-sovereign identity for healthcare using blockchain
Secure and reliable identity is essential for identifying a user accurately and providing
services. The traditional centralized identity systems have several security weaknesses and …
services. The traditional centralized identity systems have several security weaknesses and …
BSKM-FC: Blockchain-based secured key management in a fog computing environment
With an increase in the number of devices in the edge layer connected to the fog server of
the fog computing environment, it is found that vulnerable and unauthorized activities are …
the fog computing environment, it is found that vulnerable and unauthorized activities are …
Cryptography algorithms for enhancing IoT security
In today's fast-paced world, a new technology paradigm known as the Internet of Things
(IoT) is advancing every business. It provides communication between the digital and …
(IoT) is advancing every business. It provides communication between the digital and …
[PDF][PDF] A conceptual framework of green smart IoT-based supply chain management
The green smart supply chain is a phenomenon that has emerged as a result of the
development of sustainable and smart business and information technology trends …
development of sustainable and smart business and information technology trends …
An optimized, dynamic, and efficient load-balancing framework for resource management in the internet of things (iot) environment
Major problems and issues in Internet of Things (IoT) systems include load balancing,
lowering operational expenses, and power usage. IoT devices typically run on batteries …
lowering operational expenses, and power usage. IoT devices typically run on batteries …