Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment

V Kavitha - Peer-to-Peer Networking and Applications, 2021 - Springer
Abstract Wireless Sensor Networks (WSN) are naturally resource-constrained and have
been deployed in various applications such as home monitoring, health care monitoring and …

A machine-learning-based approach for autonomous IoT security

T Saba, K Haseeb, AA Shah, A Rehman… - IT …, 2021 - ieeexplore.ieee.org
Machine learning techniques are proven valuable for the Internet of things (IoT) due to
intelligent and cost-effective computing processes. In recent decades, wireless sensor …

A game-theoretic approach for enhancing security and data trustworthiness in IoT applications

MS Abdalzaher, O Muta - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSNs)-based Internet of Things (IoT) are among the fast
booming technologies that drastically contribute to different systems' management and …

Bio-inspired multilevel security protocol for data aggregation and routing in IoT WSNs

N Chandnani, CN Khairnar - Mobile Networks and Applications, 2022 - Springer
The resource limitation and unreliability of IoT WSN makes the sensors susceptible to a lot of
malicious attacks. In this research work, we propose ANT Particle Swarm Optimization …

Secure routing-based energy optimization for IOT application with heterogeneous wireless sensor networks

R Nagaraju, SB Goyal, C Verma, CO Safirescu… - Energies, 2022 - mdpi.com
Wireless sensor networks (WSNs) and the Internet of Things (IoT) are increasingly making
an impact in a wide range of domain-specific applications. In IoT-integrated WSNs, nodes …

WSN-IoT clustering for secure data transmission in e-health sector using green computing strategy

A Srivastava, A Singh, SG Joseph… - … on Cyber and IT …, 2021 - ieeexplore.ieee.org
Energy was one of the 21st century's most critical components. Electronics and computer
technologies have been widely used nowadays to simplify work every day. The crisis and …

Improved secure encryption with energy optimization using random permutation pseudo algorithm based on internet of thing in wireless sensor networks

S Nagaraj, AB Kathole, L Arya, N Tyagi, SB Goyal… - Energies, 2022 - mdpi.com
The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this
expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low …

An energy-efficient data aggregation mechanism for IoT secured by blockchain

A Ahmed, S Abdullah, M Bukhsh, I Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is getting important and interconnected technologies of the
world, consisting of sensor devices. The internet is smoothly changing from an internet of …

Deep-reinforcement-learning-based QoS-aware secure routing for SDN-IoT

X Guo, H Lin, Z Li, M Peng - IEEE Internet of things journal, 2019 - ieeexplore.ieee.org
Recently, with the proliferation of communication devices, Internet of Things (IoT) has
become an emerging technology which facilitates massive devices to be enabled with …

Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey

S Zaman, K Alhazmi, MA Aseeri, MR Ahmed… - Ieee …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …