A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions

M Burhan, H Alam, A Arsalan, RA Rehman… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …

Trust management system in wireless sensor networks: design considerations and research challenges

F Ishmanov, AS Malik, SW Kim… - Transactions on …, 2015 - Wiley Online Library
Trust is an important factor in wireless sensor networks (WSNs) in terms of security
enhancement and successful collaboration. Trust management (TM) can ensure that all …

Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs

K Haseeb, N Islam, A Almogren, IU Din… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) enables modern improvements in smart sensors, RFID, Internet
technologies, and communication protocols. Sensor nodes are treated as smart devices and …

Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

TERP: A trust and energy aware routing protocol for wireless sensor network

A Ahmed, KA Bakar, MI Channa, K Haseeb… - IEEE Sensors …, 2015 - ieeexplore.ieee.org
In most of the applications of wireless sensor networks (WSNs), nodes operate in
unattended environments and are, therefore, vulnerable to variety of attacks. Due to dynamic …

Exploring the trust management mechanism in self-organizing complex network based on game theory

HJ Li, Q Wang, S Liu, J Hu - Physica A: Statistical Mechanics and its …, 2020 - Elsevier
The trust management mechanism can used to establish cooperation relationship between
nodes and decrease risk caused by the information interaction. In this paper, we propose a …

AGEN-AODV: an intelligent energy-aware routing protocol for heterogeneous mobile ad-hoc networks

M Nabati, M Maadani, MA Pourmina - Mobile Networks and Applications, 2022 - Springer
Abstract Mobile Ad-hoc Networks (MANETs) consist of mobile nodes that usually have
limited energy resources. MANET routing protocols should consider the dynamics and …

Bio-inspired multilevel security protocol for data aggregation and routing in IoT WSNs

N Chandnani, CN Khairnar - Mobile Networks and Applications, 2022 - Springer
The resource limitation and unreliability of IoT WSN makes the sensors susceptible to a lot of
malicious attacks. In this research work, we propose ANT Particle Swarm Optimization …

A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks

AR Rajeswari, K Kulothungan, S Ganapathy… - Peer-to-Peer Networking …, 2019 - Springer
Abstract Mobile Ad-hoc Networks have distinct characteristics namely lack of centralized
control and management, severe resource constraints in terms of energy level of nodes …

Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET

S Gurung, S Chauhan - Wireless Networks, 2019 - Springer
The recent development in wireless communication technology and portable devices has
led to the development of Mobile Ad-Hoc Network which has unique features such as …