Differential privacy techniques for cyber physical systems: A survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …

Design of traffic emergency response system based on internet of things and data mining in emergencies

Z Liu, C Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Urban emergencies are hard to avoid. Traffic emergency response after an incident plays an
important role in reducing losses and is a key link in urban emergency management …

Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment

LFA Roman, PRL Gondim - Ad hoc networks, 2020 - Elsevier
Abstract The Internet of Things (IoT) has developed very rapidly in recent years, becoming
increasingly complex. The communication things networks (CTNs) is a very important …

Integrated smart door system in apartment room based on internet

M Husni, HT Ciptaningtyas, RR Hariadi… - Telkomnika …, 2019 - telkomnika.uad.ac.id
Abstract Internet of Things (IoT) is technology which provides communication between
machines without human intervention. There are many applications that implement IoT …

Internet of things architectural elements, challenges and future directions

R Kushwah, PK Batra, A Jain - 2020 6th International …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging paradigm that seamlessly integrates smart
devices, sensor nodes, network gateways, actuators, radio frequency identification and …

Termo: Smart air conditioner controller integrated with temperature and humidity sensor

RR Hariadi, A Yuniarti, I Kuswardayan… - … on Information & …, 2019 - ieeexplore.ieee.org
Air Conditioner is widely used in residential and commercial buildings. The air conditioner
has the highest power consumption. The aspect of thermal comfort that affects human life …

Pandemic management using Internet of Things and Big Data–a security and privacy perspective

KS Arvind, S Vanitha, KS Suganya - IoT and Big Data Analytics for …, 2022 - taylorfrancis.com
Pandemic management via technologies like Internet of Things, artificial intelligence, 5G,
Blockchain have made huge impact across the world in these difficult times. The current …

Efficient routing protocol for location privacy preserving in internet of things

R Kaur, K Verma, SK Jain, N Kesswani - International Journal of …, 2019 - igi-global.com
Internet of Things is a norm which has expanded very swiftly with high magnitude of
heterogeneity and functionalities. Security and privacy became the prime factors of Internet …

Authentication protocol built from a chaotic cryptosystem for a fog and cloud-based CWD-WPT charging station

LFA Roman, P de Lira Gondim - 2021 International Wireless …, 2021 - ieeexplore.ieee.org
In vehicular ad-hoc networks for electric vehicles (EV), the possibility of charging EVs while
driving (CWD) with the use of wireless power transfer (WPT) technology offers advantages …

Graph convolutional networks-based robustness optimization for scale-free Internet of Things

Y Peng, C Liu, Y Wu, S Liu, K Wang - Intelligent Data Analysis, 2022 - content.iospress.com
Abstract The Internet of Things (IoT) devices have limited resources and are vulnerable to
attacks, so optimizing their network topology to resist random failures and malicious attacks …