Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
In recent years, with the development of cloud computing, the Internet of Things (IoT), and
other technologies, mobile intelligent transportation systems, particularly the vehicular ad …
other technologies, mobile intelligent transportation systems, particularly the vehicular ad …
An optimized ticket manager based energy‐aware multipath routing protocol design for IoT based wireless sensor networks
MK Roberts, J Thangavel - Concurrency and Computation …, 2022 - Wiley Online Library
Recently, wireless sensor networks (WSNs) and Internet of Things (IoTs) have emanated as
an indispensable assets that play a critical role in revolutionizing the field of data …
an indispensable assets that play a critical role in revolutionizing the field of data …
An improvement of DV-hop localization algorithm based on improved adaptive genetic algorithm for wireless sensor networks
H Sun, H Li, Z Meng, D Wang - Wireless Personal Communications, 2023 - Springer
Wireless sensor networks (WSNs) are networks consisting of many sensors, each of which
acquires data and communicates with each other through wireless equipment in time. To …
acquires data and communicates with each other through wireless equipment in time. To …
A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT
AB Feroz Khan, G Anandharaj - Wireless Personal Communications, 2021 - Springer
There are many smart applications evolved in the area of the wireless sensor networks. The
applications of WSNs are exponentially increasing every year which creates a lot of security …
applications of WSNs are exponentially increasing every year which creates a lot of security …
Secrecy aware key management scheme for Internet of Healthcare Things
Abstract The Internet of Things (IoT) is becoming an essential aspect of digital healthcare
information; the goal is to monitor various health parameters regularly to make healthcare …
information; the goal is to monitor various health parameters regularly to make healthcare …
A Multi-layer Security approach for DDoS detection in Internet of Things
AB Feroz Khan - International Journal of Intelligent Unmanned …, 2021 - emerald.com
Purpose The purpose of the paper is to analyze the layer wise security issues in IoT and to
obtain the effective security mechanism for jamming attack. Design/methodology/approach …
obtain the effective security mechanism for jamming attack. Design/methodology/approach …
Energy aware Clustered blockchain data for IoT: An end-to-end lightweight secure & Enroute filtering approach
S Ramamoorthi, A Appathurai - Computer communications, 2023 - Elsevier
Internet of things (IoT) include smart homes, smart buildings and smart factories, in which all
the devices are connected over the internet through wireless network for data transmission …
the devices are connected over the internet through wireless network for data transmission …
A cloud-based monitoring system for performance analysis in IoT industry
Y Peng, IC Wu - The Journal of Supercomputing, 2021 - Springer
As enterprise information systems grow in scale and computing resources remain limited,
some computing system services run into occasional abnormalities such as degraded …
some computing system services run into occasional abnormalities such as degraded …
[PDF][PDF] A scoping study on lightweight cryptography reviews in IoT
IR Chiadighikaobi, N Katuk - Baghdad Science Journal, 2021 - iasj.net
The efforts in designing and developing lightweight cryptography (LWC) started a decade
ago. Many scholarly studies in literature report the enhancement of conventional …
ago. Many scholarly studies in literature report the enhancement of conventional …
MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment
Securing confidential data against unauthorized users leads to access control policies with
the rapid progression of Internet of Things (IoT) devices. Because of high mobility …
the rapid progression of Internet of Things (IoT) devices. Because of high mobility …