[HTML][HTML] Lightweight public key infrastructure for the Internet of Things: A systematic literature review

M El-Hajj, P Beune - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract The Internet of Things (IoT) has transformed everyday environments into
interconnected cyber–physical systems, enabling automation and assistance for diverse …

[PDF][PDF] Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT.

JR Arunkumar, S Velmurugan… - … Systems Science & …, 2023 - cdn.techscience.cn
Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of
applications and greatly attractive benefits, for example, self-governing, low expenditure on …

[PDF][PDF] Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm.

K Sudharson, S Arun - Intelligent Automation & Soft Computing, 2022 - cdn.techscience.cn
Quantum Computing (QC). The content of node or sink nodes is processed using the
fundamental principles of quantum mechanics. However, cryptography techniques face …

Sensor Node Communication based Selfish Node Detection in Mobile Wireless Sensor Networks

SJJ Thangaraj, N Ramshankar… - … on Intelligent and …, 2023 - ieeexplore.ieee.org
A mobile wireless sensor network (MWSN) is a self-configuring network that does not
require a fixed structure, which minimizes its operation time. At the same time, every node in …

Artificial general intelligence-based rational behavior detection using cognitive correlates for tracking online harms

S Naseem, A Alhudhaif, M Anwar, KN Qureshi… - Personal and Ubiquitous …, 2023 - Springer
Expert systems possess human-like expertise for data analyzing as well as for decision-
making. These systems are suitable in a situation, where a high level of uncertainty exists. In …

An improved biometric based user authentication and key agreement scheme for intelligent sensor based wireless communication

B Khalid, KN Qureshi, KZ Ghafoor, G Jeon - Microprocessors and …, 2023 - Elsevier
The new communication technologies have changed the traditional networks processes and
provides more feasible, and convenient services for healthcare, agriculture, and …

[PDF][PDF] Dingo algorithm-based forwarder selection and huffman coding to improve authentication

NU Bhanu, PB Priya, T Sajana, S Shanthi… - Indonesian Journal of …, 2023 - academia.edu
In wireless sensor network (WSN), the high volume of observe and transmitted data among
sensor nodes make it requires to maintain the security. Even though numerous secure data …

A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security

AE Adeniyi, RG Jimoh, JB Awotunde - Computers and Electrical …, 2024 - Elsevier
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …

[PDF][PDF] Wicked node detection in wireless ad-hoc network by applying supervised learning.

CS Ranganathan, R Sampathrajan - International Journal of …, 2024 - academia.edu
A wireless ad-hoc network (WANET) is a decentralized network supported by wireless
connections without a pre-existing architecture. However, the mobility of nodes is a defining …

A lightweight authentication framework for fault-tolerant distributed WSN

KS Sai, R Bhat, M Hegde, J Andrew - IEEE Access, 2023 - ieeexplore.ieee.org
The vast production of resource-constrained wireless communication devices and the
development of various techniques in recent years opens room for security concerns to …