Video surveillance systems-current status and future trends

V Tsakanikas, T Dagiuklas - Computers & Electrical Engineering, 2018 - Elsevier
Within this survey an attempt is made to document the present status of video surveillance
systems. The main components of a surveillance system are presented and studied …

Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key

A Ghani, K Mansoor, S Mehmood… - International Journal …, 2019 - Wiley Online Library
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense
various events in the surrounding environment and report back to the base station. Sensor …

Empirical evaluation of privacy efficiency in blockchain networks: Review and open challenges

AZ Junejo, MA Hashmani, MM Memon - Applied Sciences, 2021 - mdpi.com
With the widespread of blockchain technology, preserving the anonymity and confidentiality
of transactions have become crucial. An enormous portion of blockchain research is …

Improved secure encryption with energy optimization using random permutation pseudo algorithm based on internet of thing in wireless sensor networks

S Nagaraj, AB Kathole, L Arya, N Tyagi, SB Goyal… - Energies, 2022 - mdpi.com
The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this
expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low …

Image compression techniques in wireless sensor networks: A survey and comparison

BA Lungisani, CK Lebekwe, AM Zungeru… - IEEE Access, 2022 - ieeexplore.ieee.org
There is continuous intensive research on image compression techniques in wireless
sensor networks (WSNs) in the literature. Some of the image compression techniques in …

Medical images transmission over wireless multimedia sensor networks with high data rate

H Kasban, S Nassar, MAM El-Bendary - Analog Integrated Circuits and …, 2021 - Springer
This paper presents several proposed scenarios for medical image transmission over
Wireless Multimedia Sensor Networks with multi-level security tools and Unequal Error …

Depletion-of-battery attack: Specificity, modelling and analysis

V Shakhov, I Koo - Sensors, 2018 - mdpi.com
The emerging Internet of Things (IoT) has great potential; however, the societal costs of the
IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the …

A prioritization approach for optimization of multiple concurrent sensing applications in smart cities

DG Costa, FP de Oliveira - Future Generation Computer Systems, 2020 - Elsevier
The development of more efficient communication technologies and the affordability of
powerful hardware platforms have brought the smart cities prospects to a more realistic …

Physical-layer identification of wireless IoT nodes through PUF-controlled transmitter spectral regrowth

Q Zhou, Y He, K Yang, T Chi - IEEE Transactions on Microwave …, 2023 - ieeexplore.ieee.org
Securing low-power Internet-of-Things (IoT) sensor nodes is a critical challenge for the
widespread adoption of IoT technology due to their limited energy, computation, and storage …

An enhanced lightweight dynamic pseudonym identity based authentication and key agreement scheme using wireless sensor networks for agriculture monitoring

M Chen, TF Lee, JI Pan - Sensors, 2019 - mdpi.com
Agriculture plays an important role for many countries. It provides raw materials for food and
provides large employment opportunities for people in the country, especially for countries …