IoT-based enterprise resource planning: Challenges, open issues, applications, architecture, and future research directions

M Tavana, V Hajipour, S Oveisi - Internet of Things, 2020 - Elsevier
In today's highly competitive markets, organizations can create a competitive advantage
through the successful implementation of Enterprise Resource Planning (ERP) systems …

Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

A secure industrial internet of things (IIoT) framework for resource management in smart manufacturing

KA Abuhasel, MA Khan - IEEE Access, 2020 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) can transform an existing isolated industrial system to
a connected network. The IIoT and the related wireless connectivity requirements for …

Reliable data dissemination for the Internet of Things using Harris hawks optimization

A Seyfollahi, A Ghaffari - Peer-to-Peer Networking and Applications, 2020 - Springer
Abstract Internet of Things (IoT) entities compile a massive volume of sensing data and
transmit it to the cloud for processing and reasoning. Reliable and secure data aggregation …

Chaotic whale crow optimization algorithm for secure routing in the IoT environment

MG Raj, SK Pani - International Journal on Semantic Web and …, 2022 - igi-global.com
This paper solves the internet of things (IoT) security issues by introducing a chaotic whale
crow (CWC) optimization, which is the integration of chaotic whale optimization algorithm …

Secure data transmission framework for confidentiality in IoTs

NN Hurrah, SA Parah, JA Sheikh, F Al-Turjman… - Ad Hoc Networks, 2019 - Elsevier
The large-scale data exchange envisioned to occur in distributed IoTs is prone to raise
issues regarding privacy, confidentiality and authentication at the cyberspace level. This …

Improved blowfish algorithm-based secure routing technique in IoT-based WSN

M Alotaibi - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) has gained popularity with the growth and prospects of smart
networks. It is intended to exploit the network edges, which enables smart service and …

A provable secure cybersecurity mechanism based on combination of lightweight cryptography and authentication for Internet of Things

AA Ahmed, SJ Malebary, W Ali, AA Alzahrani - Mathematics, 2023 - mdpi.com
Internet of Things devices, platform programs, and network applications are all vulnerable to
cyberattacks (digital attacks), which can be prevented at different levels by using …

Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks

R Montero-Canela, E Zambrano-Serrano… - Ad Hoc Networks, 2020 - Elsevier
Ad Hoc networks are considered essential elements of the Internet of Things (IoT), which is a
technological trend for innovative future applications. Since in IoT systems the devices are …

[HTML][HTML] Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things

V Akshaya, V Mandala, C Anilkumar, P VishnuRaja… - Measurement …, 2023 - Elsevier
Exponential increases in smart devices and reduced costs of sensors have increased
applications using IoT (Internet of Things). There has been an extensive analysis on the …