Toras: Trustworthy load-balanced opportunistic routing for asynchronous duty-cycled wsns
As opportunistic routing (OR) becomes more popular in low-duty wireless sensor networks
(WSNs), there is a greater demand for reliable and consistent data transmission. Only …
(WSNs), there is a greater demand for reliable and consistent data transmission. Only …
HCFAIUN: A novel hyperelliptic curve and fuzzy extractor-based authentication for secure data transmission in IoT-based UAV networks
J Sharma, PS Mehra - Vehicular Communications, 2024 - Elsevier
IoT-based UAV networks comprise interconnected UAVs outfitted with sensors and
microcontrollers to simplify data exchange in environments such as smart cities. In light of …
microcontrollers to simplify data exchange in environments such as smart cities. In light of …
A Secure and Lightweight NDN-Based Vehicular Network Using Edge Computing and Certificateless Signcryption
Named data networking (NDN), which is an implementation of Information-Centric
Networking (ICN), has emerged as a promising new direction in networking as a result of the …
Networking (ICN), has emerged as a promising new direction in networking as a result of the …
[HTML][HTML] Enhancing security and privacy in smart agriculture: A novel homomorphic signcryption system
K Taji, F Ghanimi - Results in Engineering, 2024 - Elsevier
Abstract Technology driven Smart Agriculture is transforming modern day farming practices
through digital tools and real-time data analysis. It monitors plant health in both soil and …
through digital tools and real-time data analysis. It monitors plant health in both soil and …
iSecureHealth: An efficient and secure technique to exchange health data using IoMT devices
CK Dhar, A Majumder - Smart Health, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) is a subset of the Internet of Things (IoT),
which consists of internet-connected medical devices, hardware, and software applications …
which consists of internet-connected medical devices, hardware, and software applications …
An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing
S Ullah, Z Jiangbin, MT Hussain, MW Sardar… - Cluster …, 2024 - Springer
The risks of misusing new and developing technology are increasing on a daily basis. In
these technologies, electronic communication (e-communication) anonymously delivers …
these technologies, electronic communication (e-communication) anonymously delivers …
Authenticated key agreement for IoT network using HECC and CRT four co-primes
Abstract Internet of Things (IoT) is an integral part of our daily lives and the security of these
devices is paramount. However, IoT devices are often resource constrained, requiring …
devices is paramount. However, IoT devices are often resource constrained, requiring …
Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard
HV Krishna, KR Sekhar - Soft Computing, 2024 - Springer
The industrial internet of things (IIoT) refers to a system of interconnected equipment,
sensors, and devices deployed within industrial environments whose primary function is to …
sensors, and devices deployed within industrial environments whose primary function is to …