Healthcare Internet of Things (H-IoT): Current trends, future prospects, applications, challenges, and security issues

M Kumar, A Kumar, S Verma, P Bhattacharya… - Electronics, 2023 - mdpi.com
Advancements in Healthcare Internet of Things (H-IoT) systems have created new
opportunities and solutions for healthcare services, including the remote treatment and …

[HTML][HTML] Classification and comparison of ad hoc networks: A review

R Agrawal, N Faujdar, CAT Romero, O Sharma… - Egyptian Informatics …, 2023 - Elsevier
The study of ad hoc networks and their different varieties, including wireless sensor
networks, wireless mesh networks, and mobile ad hoc networks, is discussed in this paper …

A smart privacy preserving framework for industrial IoT using hybrid meta-heuristic algorithm

M Kumar, P Mukherjee, S Verma, Kavita, J Shafi… - Scientific Reports, 2023 - nature.com
Abstract Industrial Internet of Things (IIoT) seeks more attention in attaining enormous
opportunities in the field of Industry 4.0. But there exist severe challenges related to data …

A lightweight anomaly detection system for black hole attack

A Abdelhamid, MS Elsayed, AD Jurcut, MA Azer - Electronics, 2023 - mdpi.com
Mobile ad hoc networks (MANETs) are now key in today's new world. They are critically
needed in many situations when it is crucial to form a network on the fly while not having the …

Artificial dragonfly algorithm in the Hopfield neural network for optimal Exact Boolean k satisfiability representation

GA Ali, H Abubakar, SAS Alzaeemi, AHM Almawgani… - Plos one, 2023 - journals.plos.org
This study proposes a novel hybrid computational approach that integrates the artificial
dragonfly algorithm (ADA) with the Hopfield neural network (HNN) to achieve an optimal …

Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs

VR Sugumaran, A Rajaram - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
This paper focuses on achieving high-level security in Mobile Adhoc Networks (MANET) by
incorporating Blockchain technology-based Intrusion Detection systems (IDS). The existing …

Digital Image Identification and Verification Using Maximum and Preliminary Score Approach with Watermarking for Security and Validation Enhancement

S Upadhyay, M Kumar, A Upadhyay, S Verma, Kavita… - Electronics, 2023 - mdpi.com
Digital face approaches possess currently received awesome attention because of their
huge wide variety of digital audio, and visual programs. Digitized snapshots are …

Generative Boltzmann adversarial network in Manet attack detection and QOS enhancement with latency

AK Marandi, R Dogra, R Bhatt, R Gupta… - International …, 2022 - search.proquest.com
Abstract Mobile Ad-Hoc Network (MANET) are considered as self-configured network those
does not have any centralized base station for the network monitoring and control. MANET …

Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks

MS Gowtham, M Ramkumar, SS Jamaesha… - Computers & …, 2024 - Elsevier
Abstract In a Mobile Ad hoc Network (MANET), the network structure constantly evolves due
to the movement of devices, users, or nodes. The Black Hole Attack (BHA) is recognized as …

ABGF-AODV protocol to prevent black-hole, gray-hole and flooding attacks in MANET

S Gurung, V Mankotia - Telecommunication Systems, 2024 - Springer
Wireless ad hoc networks play a pivotal role in wireless communication systems. MANETs
find extensive applications across various domains, encompassing real-time information …