Secrecy rate maximization in virtual-MIMO enabled SWIPT for 5G centric IoT applications
In 5G centric sensors-enabled Internet of Things (IoT) applications, virtual multiple-input
multiple-output (V-MIMO) technique has witnessed significant attention as physical layer …
multiple-output (V-MIMO) technique has witnessed significant attention as physical layer …
Secure and Efficient Subnet Routing Protocol for MANET.
Mobile ad hoc Network have no base station wireless network and a decentralized way for a
large network1 The network topology of MANET is in general movable, because the …
large network1 The network topology of MANET is in general movable, because the …
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15. 4 wireless sensor networks
Among the classes of wireless personal area networks, a wireless sensor network typically
refers to a versatile and densely distributed sensing platform that enables the support of a …
refers to a versatile and densely distributed sensing platform that enables the support of a …
SEAMLESS Project: Development of a Performing Secure Platform for IEEE 802.15. 4 WSN Applications
L Pomante, M Pugliese, L Bozzi… - 2020 23rd Euromicro …, 2020 - ieeexplore.ieee.org
This paper deals with the design and implementation of security mechanisms in Wireless
Sensor Networks (WSN) based applications, without the support of external “resource …
Sensor Networks (WSN) based applications, without the support of external “resource …
Cryptosystem by a community of devices with limited resources
R Hadaoui, K Tamine, M Daoui… - International Journal of …, 2020 - inderscienceonline.com
Rivest-Shamir-Adleman (RSA) is an encryption algorithm with public-key and is the most
widely used for secure data transmission. It provides high safety and consists of modular …
widely used for secure data transmission. It provides high safety and consists of modular …