Security issues and challenges in internet of things (iot) system
JA Beltran, P Mudholkar, M Mudholkar… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
Significant privacy and security concerns apply to the Internet of Things. IoT issues might
include driver ignorance, inadequate device updates, a lack of robust and effective …
include driver ignorance, inadequate device updates, a lack of robust and effective …
A novel approach to iot based plant health monitoring system in smart agriculture
M Mudholkar, P Mudholkar… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The study and practice of recognizing and resolving physiological and biologic processes
that prevent plants from reaching their full hereditary potential for applications such as food …
that prevent plants from reaching their full hereditary potential for applications such as food …
[HTML][HTML] Hybrid K-medoids with energy-efficient sunflower optimization algorithm for wireless sensor networks
S Al-Otaibi, V Cherappa, T Thangarajan… - Sustainability, 2023 - mdpi.com
Wireless sensor network (WSN) sensor nodes should have adequate energy. Reduced
energy usage is essential to maximize the endurance of WSNs. Combining WSN with a …
energy usage is essential to maximize the endurance of WSNs. Combining WSN with a …
Fuzzy logic‐based trusted routing protocol using vehicular cloud networks for smart cities
Due to the characteristics of vehicular ad hoc networks, the increased mobility of nodes and
the inconsistency of wireless communication connections pose significant challenges for …
the inconsistency of wireless communication connections pose significant challenges for …
Enhancing Fault Detection in Wireless Sensor Networks Through Support Vector Machines: A Comprehensive Study
Y Mardenov, A Adamova, T Zhukabayeva… - Journal of Robotics …, 2023 - journal.umy.ac.id
Abstract The Wireless Sensor Network (WSN) consists of many sensors that are distributed
in a specific area for the purpose of monitoring physical conditions. Factors such as …
in a specific area for the purpose of monitoring physical conditions. Factors such as …
The block chain technology to protect data access using intelligent contracts mechanism security framework for 5G networks
R Yadav, KK Vaigandla… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The introduction of the study primarily emphasises the significance of utilising block chain
technologies with the possibility of privacy and security benefits from the 5G Network. One …
technologies with the possibility of privacy and security benefits from the 5G Network. One …
Software Complex for Modelling Routing in Heterogeneous Model of Wireless Sensor Network
NF Mohammad, LI Voronova… - 2024 Systems of …, 2024 - ieeexplore.ieee.org
Modern communication technologies form the foundation for interactions between various
objects on the Internet of Things. An autonomous mobile complex is equipped with sensors …
objects on the Internet of Things. An autonomous mobile complex is equipped with sensors …
Analysis of Potential Health and Environmental Risks Associated with 6G Wireless Communication Networks
Over the last several decades, there has been a meteoric rise in the number of people
wanting to connect wirelessly. Due to rapid growth of new applications (such as real-time …
wanting to connect wirelessly. Due to rapid growth of new applications (such as real-time …
Blockchain approach for implementing access control in IOT
J Panduro-Ramirez, M Lourens… - 2023 International …, 2023 - ieeexplore.ieee.org
Block chain is now attracting a lot of interest from scientists and experts for a variety of
reasons, including wireless communication decentralization, remote access, digital security …
reasons, including wireless communication decentralization, remote access, digital security …
A Graph Database-Based Method for Network Log File Analysis
K Sharma, A Kumar - … on System Modeling & Advancement in …, 2022 - ieeexplore.ieee.org
It is frequently required to evaluate data acquired from numerous network logs in order to
offer a more accurate judgement of the severity of a cyber threat. This may be accomplished …
offer a more accurate judgement of the severity of a cyber threat. This may be accomplished …