Secrecy rate maximization in virtual-MIMO enabled SWIPT for 5G centric IoT applications

A Jaiswal, S Kumar, O Kaiwartya, N Kumar… - IEEE Systems …, 2020 - ieeexplore.ieee.org
In 5G centric sensors-enabled Internet of Things (IoT) applications, virtual multiple-input
multiple-output (V-MIMO) technique has witnessed significant attention as physical layer …

Secure and Efficient Subnet Routing Protocol for MANET.

K Kishor, P Nand, P Agarwal - Indian Journal of Public Health …, 2018 - indianjournals.com
Mobile ad hoc Network have no base station wireless network and a decentralized way for a
large network1 The network topology of MANET is in general movable, because the …

Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15. 4 wireless sensor networks

W Tiberti, F Caruso, L Pomante… - International …, 2020 - journals.sagepub.com
Among the classes of wireless personal area networks, a wireless sensor network typically
refers to a versatile and densely distributed sensing platform that enables the support of a …

SEAMLESS Project: Development of a Performing Secure Platform for IEEE 802.15. 4 WSN Applications

L Pomante, M Pugliese, L Bozzi… - 2020 23rd Euromicro …, 2020 - ieeexplore.ieee.org
This paper deals with the design and implementation of security mechanisms in Wireless
Sensor Networks (WSN) based applications, without the support of external “resource …

Cryptosystem by a community of devices with limited resources

R Hadaoui, K Tamine, M Daoui… - International Journal of …, 2020 - inderscienceonline.com
Rivest-Shamir-Adleman (RSA) is an encryption algorithm with public-key and is the most
widely used for secure data transmission. It provides high safety and consists of modular …