[HTML][HTML] Efficient time-oriented latency-based secure data encryption for cloud storage

S Ahmad, S Mehfuz - Cyber Security and Applications, 2024 - Elsevier
To ensure data security in the cloud, there exist several techniques proposed by various
researchers. The most common method is the usage of data encryption techniques like …

A Software Framework for Intelligent Security Measures Regarding Sensor Data in the Context of Ambient Assisted Technology

S Ahmed, P Naga Srinivasu, A Alhumam - Sensors, 2023 - mdpi.com
Ambient assisted technology (AAT), which has the potential to enhance patient care and
productivity and save costs, has emerged as a strategic goal for developing e-healthcare in …

Strengthening KMS Security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies

JO Ogala, S Ahmad, I Shakeel, J Ahmad… - SN Computer …, 2023 - Springer
This paper presents an innovative approach to strengthening Key Management Systems
(KMS) against the escalating landscape of cyber threats by integrating advanced …

An IHPO-WNN-Based Federated Learning System for Area-Wide Power Load Forecasting Considering Data Security Protection

B Shi, X Zhou, P Li, W Ma, N Pan - Energies, 2023 - mdpi.com
With the rapid growth of power demand and the advancement of new power system
intelligence, smart energy measurement system data quality and security are also facing the …

Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard

HV Krishna, KR Sekhar - Soft Computing, 2024 - Springer
The industrial internet of things (IIoT) refers to a system of interconnected equipment,
sensors, and devices deployed within industrial environments whose primary function is to …

Comparative Analysis of Encryption and Decryption for Securing Environmental Sector Telemetry Data

A Abdullah, N Hafeez, A Ur Rehman… - … of Computing and …, 2024 - journals.uob.edu.bh
This work investigates the encryption and decoding strategies for getting ecological sensor
telemetry information. The review assesses both symmetric and awry encryption calculations …

[PDF][PDF] A Hybrid Algorithm For Enhancement of the Data Security during Network Transmission Based on RSA and DH.

O Salah, A El-Sawy, M Taha - … Journal of Intelligent Engineering & Systems, 2023 - inass.org
Due to the tremendous technological transformation, more technologies and internet of
things (IoT) devices are employed in today's digital world. The majority of these technologies …

Novel methods in utilizing wireless sensor networks with blockchain technology: A review

AMB Giridi, L Jhansi, DT Sharon… - MATEC Web of …, 2024 - matec-conferences.org
Wireless Sensor Networks (WSNs) play a vital role in achieving quick and efficient results.
These networks comprise small, affordable sensors that collect valuable data from their …

An Energy-Efficient Cluster Head Selection and Secure Data Transmission in WSN using Spider Monkey Optimized Algorithm and Hybrid Cryptographic with Security

M Yuvaraja, S Sureshkumar… - Salud, Ciencia y …, 2024 - conferencias.saludcyt.ar
To conserve energy in wireless sensor networks, clustering is the well-known strategies.
However, choosing a cluster head that is energy efficient is crucial for the best clustering …

Multi‐lingual encryption technique using Unicode and Riemann zeta function and elliptic curve cryptography for secured routing in wireless sensor networks

K Yesodha, S Viswanathan, M Krishnamurthy… - Concurrency and … - Wiley Online Library
Secure routing and communication with confidentiality based on encryption of texts in
multiple natural languages are challenging issues in wireless sensor networks which are …