… that allows electromagnetic fields to transfer the identification … the network field produces a number based on random strategy … BS minimizes energy consumption and longer the network …
… class-dependent costoptimizationmechanism. In the … and the stacked-deep polynomial network for IoTsecurity. In the … , and rapidity of random neural networks for IDS. Only a handful of …
S Sefati, NJ Navimipour - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
… has been known as the InternetofThings (IoT), where all … ) parameters, are recognized in the IoT domain. Since this issue is … can be brought into the IoT, depending on users’ demands. …
… In literature, IDSbased learning mechanisms have been … In random Ad hoc sensor networks, the sensor nodes are … [37] merged the DSR routing with ant-colony optimization to …
… Based on the random number, a preset of a number of nodes … and reliable data security mechanismsbased on XOR hash … On the other hand, our proposed framework minimizes the …
… where we present the need for networkoptimization in IoT, … LTE Random Access Channel (RACH) mechanism. This … author in [91], proposes a data offloading mechanismbased …
… (CE)-basedstochasticoptimization technique. Using traffic of … for device identification (or classification) should take the cost of … the broad areas of network and system security, security …
N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
… IoTsecurity threats and challenges for IoTnetworks by evaluating existing defense techniques. Our main focus is on network … detail IoTsecurity challenges such as Object identification, …
… key, a random number, termed … ID of the destination is identical to its ID, the pairwise key is encrypted, MAC is verified and the encrypted packet of neighbor with nonce as well as its ID …