IoT security: Review, blockchain solutions, and open challenges
MA Khan, K Salah - Future generation computer systems, 2018 - Elsevier
With the advent of smart homes, smart cities, and smart everything, the Internet of Things
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …
People, processes, and things are connected with the Internet through IoT. With the …
Consensus clock synchronization for wireless sensor networks
MK Maggs, SG O'keefe, DV Thiel - IEEE sensors Journal, 2012 - ieeexplore.ieee.org
Wireless sensor networks (WSN) are emerging as a valuable tool in many fields of science
and industry. Time synchronization is an important issue for WSN's due to the collaborative …
and industry. Time synchronization is an important issue for WSN's due to the collaborative …
A survey of key management schemes in multi-phase wireless sensor networks
Abstract Wireless Sensor Networks (WSNs) are the enabling technology for smart cities,
intelligent cars and transportation systems, precision agriculture, animal tracking, and all …
intelligent cars and transportation systems, precision agriculture, animal tracking, and all …
Security and privacy issues in Blockchained IoT: Principles, Challenges and counteracting actions
Recently, both the Internet of Things (IoT) and Blockchain have gained enormous adaptation
and popularity in information-based systems. The inherent problem with IoT is security at …
and popularity in information-based systems. The inherent problem with IoT is security at …
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing
Mobile cloud computing (MCC) is gaining popularity due to anywhere anytime data access.
However, at the same time it also introduces the new privacy and security threats that have …
However, at the same time it also introduces the new privacy and security threats that have …
Organizing WWW images based on the analysis of page layout and web link structure
Due to the rapid growth of the number of digital images on the Web, there is an increasing
demand for an effective and efficient method of organizing and retrieving the images …
demand for an effective and efficient method of organizing and retrieving the images …
PRoPHET routing protocol based on neighbor node distance using a community mobility model in delay tolerant networks
P Sok, S Tan, K Kim - … & 2013 IEEE International Conference on …, 2013 - ieeexplore.ieee.org
In a Delay Tolerant Network (DTN), the Probabilistic Routing Protocol using the History of
Encounters and Transitivity (PRoPHET) routing protocol mainly uses the delivery …
Encounters and Transitivity (PRoPHET) routing protocol mainly uses the delivery …
Environmental monitoring with distributed mesh networks: An overview and practical implementation perspective for urban scenario
Almost inevitable climate change and increasing pollution levels around the world are the
most significant drivers for the environmental monitoring evolution. Recent activities in the …
most significant drivers for the environmental monitoring evolution. Recent activities in the …
Enhancing the connectivity and resiliency of random key pre-distribution schemes for wireless sensor network
V Kumar, N Malik - International Journal of System Assurance Engineering …, 2022 - Springer
A wireless sensor network is a prime arrangement to collect the data from different activities
where human interaction is limited, like far fulling areas like the deep sea, volcano, and …
where human interaction is limited, like far fulling areas like the deep sea, volcano, and …