Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …
Anomaly detection using deep neural network for IoT architecture
The revolutionary idea of the internet of things (IoT) architecture has gained enormous
popularity over the last decade, resulting in an exponential growth in the IoT networks …
popularity over the last decade, resulting in an exponential growth in the IoT networks …
A survey on node clustering in cognitive radio wireless sensor networks
Cognitive radio wireless sensor networks (CR-WSNs) have attracted a great deal of
attention recently due to the emerging spectrum scarcity issue. This work attempts to provide …
attention recently due to the emerging spectrum scarcity issue. This work attempts to provide …
[PDF][PDF] Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security.
This study presents the current state of research on multi-factor authentication.
Authentication is one of the important traits in the security domain as it ensures that …
Authentication is one of the important traits in the security domain as it ensures that …
Assessing routing strategies for cognitive radio sensor networks
Interest in the cognitive radio sensor network (CRSN) paradigm has gradually grown among
researchers. This concept seeks to fuse the benefits of dynamic spectrum access into the …
researchers. This concept seeks to fuse the benefits of dynamic spectrum access into the …
A real‐time noise resilient data link layer mechanism for unslotted IEEE 802.15. 4 networks
S Okdem - International Journal of Communication Systems, 2017 - Wiley Online Library
Summary Institute of Electrical and Electronics Engineers (IEEE) 802.15. 4 is a protocol
operating in media access control and physical layer, and it is commonly used in low‐power …
operating in media access control and physical layer, and it is commonly used in low‐power …
Mobility-enhanced reliable geographical forwarding in cognitive radio sensor networks
S Zubair, SK Syed Yusoff, N Fisal - Sensors, 2016 - mdpi.com
The emergence of the Internet of Things and the proliferation of mobile wireless devices has
brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot …
brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot …
Radio resource allocation improvements in cognitive radio sensor network for smart grid: Investigative study and solutions
EU Ogbodo, DG Dorrell… - International Journal of …, 2021 - ingentaconnect.com
Background: A Cognitive Radio Sensor Network (CRSN)-based Smart Grid (SG) is a new
paradigm for a modern SG. It is totally different from the traditional power grid and …
paradigm for a modern SG. It is totally different from the traditional power grid and …
Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme
AS Asri, FF Boestamam, HZB Zakaria… - International …, 2024 - international.arteii.or.id
With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices,
machines, and systems to optimize operations and enable data-driven decision-making …
machines, and systems to optimize operations and enable data-driven decision-making …
Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology
RLZ Siew, BCK Le, LK Yue… - International …, 2024 - international.arteii.or.id
The rapid advancement of Industrial Internet of Things (IIoT) technology necessitates robust
authentication solutions to ensure security, scalability, and efficiency. This project, titled" …
authentication solutions to ensure security, scalability, and efficiency. This project, titled" …