Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks

TY Wu, Z Lee, L Yang, JN Luo, R Tso - The Journal of Supercomputing, 2021 - Springer
In recent years, with the development of cloud computing, the Internet of Things (IoT), and
other technologies, mobile intelligent transportation systems, particularly the vehicular ad …

An optimized ticket manager based energy‐aware multipath routing protocol design for IoT based wireless sensor networks

MK Roberts, J Thangavel - Concurrency and Computation …, 2022 - Wiley Online Library
Recently, wireless sensor networks (WSNs) and Internet of Things (IoTs) have emanated as
an indispensable assets that play a critical role in revolutionizing the field of data …

An improvement of DV-hop localization algorithm based on improved adaptive genetic algorithm for wireless sensor networks

H Sun, H Li, Z Meng, D Wang - Wireless Personal Communications, 2023 - Springer
Wireless sensor networks (WSNs) are networks consisting of many sensors, each of which
acquires data and communicates with each other through wireless equipment in time. To …

A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT

AB Feroz Khan, G Anandharaj - Wireless Personal Communications, 2021 - Springer
There are many smart applications evolved in the area of the wireless sensor networks. The
applications of WSNs are exponentially increasing every year which creates a lot of security …

Secrecy aware key management scheme for Internet of Healthcare Things

C Trivedi, UP Rao - The Journal of Supercomputing, 2023 - Springer
Abstract The Internet of Things (IoT) is becoming an essential aspect of digital healthcare
information; the goal is to monitor various health parameters regularly to make healthcare …

A Multi-layer Security approach for DDoS detection in Internet of Things

AB Feroz Khan - International Journal of Intelligent Unmanned …, 2021 - emerald.com
Purpose The purpose of the paper is to analyze the layer wise security issues in IoT and to
obtain the effective security mechanism for jamming attack. Design/methodology/approach …

Energy aware Clustered blockchain data for IoT: An end-to-end lightweight secure & Enroute filtering approach

S Ramamoorthi, A Appathurai - Computer communications, 2023 - Elsevier
Internet of things (IoT) include smart homes, smart buildings and smart factories, in which all
the devices are connected over the internet through wireless network for data transmission …

A cloud-based monitoring system for performance analysis in IoT industry

Y Peng, IC Wu - The Journal of Supercomputing, 2021 - Springer
As enterprise information systems grow in scale and computing resources remain limited,
some computing system services run into occasional abnormalities such as degraded …

[PDF][PDF] A scoping study on lightweight cryptography reviews in IoT

IR Chiadighikaobi, N Katuk - Baghdad Science Journal, 2021 - iasj.net
The efforts in designing and developing lightweight cryptography (LWC) started a decade
ago. Many scholarly studies in literature report the enhancement of conventional …

MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment

G Jagadeesh, J Gitanjali, J Vellingiri… - The Journal of …, 2024 - Springer
Securing confidential data against unauthorized users leads to access control policies with
the rapid progression of Internet of Things (IoT) devices. Because of high mobility …