IoT-based enterprise resource planning: Challenges, open issues, applications, architecture, and future research directions
In today's highly competitive markets, organizations can create a competitive advantage
through the successful implementation of Enterprise Resource Planning (ERP) systems …
through the successful implementation of Enterprise Resource Planning (ERP) systems …
Secret sharing: A comprehensive survey, taxonomy and applications
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …
magnificent development in information and communication technology. Likewise …
A secure industrial internet of things (IIoT) framework for resource management in smart manufacturing
KA Abuhasel, MA Khan - IEEE Access, 2020 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) can transform an existing isolated industrial system to
a connected network. The IIoT and the related wireless connectivity requirements for …
a connected network. The IIoT and the related wireless connectivity requirements for …
Reliable data dissemination for the Internet of Things using Harris hawks optimization
A Seyfollahi, A Ghaffari - Peer-to-Peer Networking and Applications, 2020 - Springer
Abstract Internet of Things (IoT) entities compile a massive volume of sensing data and
transmit it to the cloud for processing and reasoning. Reliable and secure data aggregation …
transmit it to the cloud for processing and reasoning. Reliable and secure data aggregation …
Chaotic whale crow optimization algorithm for secure routing in the IoT environment
MG Raj, SK Pani - International Journal on Semantic Web and …, 2022 - igi-global.com
This paper solves the internet of things (IoT) security issues by introducing a chaotic whale
crow (CWC) optimization, which is the integration of chaotic whale optimization algorithm …
crow (CWC) optimization, which is the integration of chaotic whale optimization algorithm …
Secure data transmission framework for confidentiality in IoTs
The large-scale data exchange envisioned to occur in distributed IoTs is prone to raise
issues regarding privacy, confidentiality and authentication at the cyberspace level. This …
issues regarding privacy, confidentiality and authentication at the cyberspace level. This …
Improved blowfish algorithm-based secure routing technique in IoT-based WSN
M Alotaibi - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) has gained popularity with the growth and prospects of smart
networks. It is intended to exploit the network edges, which enables smart service and …
networks. It is intended to exploit the network edges, which enables smart service and …
A provable secure cybersecurity mechanism based on combination of lightweight cryptography and authentication for Internet of Things
AA Ahmed, SJ Malebary, W Ali, AA Alzahrani - Mathematics, 2023 - mdpi.com
Internet of Things devices, platform programs, and network applications are all vulnerable to
cyberattacks (digital attacks), which can be prevented at different levels by using …
cyberattacks (digital attacks), which can be prevented at different levels by using …
Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks
R Montero-Canela, E Zambrano-Serrano… - Ad Hoc Networks, 2020 - Elsevier
Ad Hoc networks are considered essential elements of the Internet of Things (IoT), which is a
technological trend for innovative future applications. Since in IoT systems the devices are …
technological trend for innovative future applications. Since in IoT systems the devices are …
[HTML][HTML] Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things
V Akshaya, V Mandala, C Anilkumar, P VishnuRaja… - Measurement …, 2023 - Elsevier
Exponential increases in smart devices and reduced costs of sensors have increased
applications using IoT (Internet of Things). There has been an extensive analysis on the …
applications using IoT (Internet of Things). There has been an extensive analysis on the …