Enhanced Data Security Framework Using Lightweight Cryptography and Multi-Level Encryption

P Chakrabarty, T Sarkar, M Rakhra… - 2024 International …, 2024 - ieeexplore.ieee.org
Network security is essential for individuals as well as organizations in the modern day,
since the majority of enterprises and organizations store their data on clouds. Therefore, a …

Generative adversarial networks-based security and applications in cloud computing: a survey

S Wang, M Yin, Y Liu, G He - Telecommunication Systems, 2024 - Springer
To meet growing business needs and exponentially increasing development and
maintenance costs, the concept of cloud computing has been proposed and developed …

An intelligent mechanism for dynamic spectrum sharing in 5G IoT networks

J Xu, X Zhaojun, Y Wenli, W Hu, A Cabani… - Expert Systems with …, 2024 - Elsevier
Amid the rapid advancement of wireless network technologies, the forthcoming ubiquity of
the Internet of Things (IoT) necessitates the development of sophisticated architectural …

APPS: Authentication-enabled privacy protection scheme for secure data transfer in Internet of Things

AK Ranjan, P Kumar - Ad Hoc Networks, 2024 - Elsevier
Abstract The Internet of Things (IoT) is an emerging field that encompasses several
heterogeneous devices and smart objects that are integrated with the network. In open …

[HTML][HTML] Deep-Reinforcement-Learning-Based Wireless IoT Device Identification Using Channel State Information

Y Li, Y Wang, X Liu, P Zuo, H Li, H Jiang - Symmetry, 2023 - mdpi.com
Internet of Things (IoT) technology has permeated into all aspects of today's society and is
playing an increasingly important role. Identity authentication is crucial for IoT devices to …

Efficient data management in Internet of Things: A survey of data aggregation techniques

X Kang - Journal of Intelligent & Fuzzy Systems, 2024 - content.iospress.com
Abstract The Internet of Things (IoT) refers to a vast network of interconnected devices,
objects, and systems powered by sensors, software, and connectivity capabilities. The …

Multi-level authentication for security in cloud using improved quantum key distribution

A Kumar, G Verma - Network: Computation in Neural Systems, 2024 - Taylor & Francis
Cloud computing is an on-demand virtual-based technology to develop, configure, and
modify applications online through the internet. It enables the users to handle various …

Privacy-Preserving Scheme for Internet of Things

T Kavitha, G Senbagavalli, S Saraswathi - Secure Communication in … - taylorfrancis.com
With the advent of the IoT age, devices connected to one another are increasingly common.
IoT devices collect this information in real time and constantly send this back to data centers …

[PDF][PDF] Secure data encryption key scenario for protecting private data security and privacy

A Pradesh - … .s3.ap-south-1.amazonaws.com
Cryptography, specifically encryption, plays a pivotal role in protecting data from
unauthorized access. However, not all encryption methods are equally effective, as some …