[HTML][HTML] Security concepts in emerging 6G communication: Threats, countermeasures, authentication techniques and research directions

SHA Kazmi, R Hassan, F Qamar, K Nisar, AAA Ibrahim - Symmetry, 2023 - mdpi.com
Challenges faced in network security have significantly steered the deployment timeline of
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …

[HTML][HTML] Access management of IoT devices using access control mechanism and decentralized authentication: A review

I Singh, B Singh - Measurement: Sensors, 2023 - Elsevier
Blockchain is a distributed system that enables data transaction security, and its distributed
and decentralized design can be used to guarantee safe and scalable IoT device …

[PDF][PDF] Energy-efficient resource allocation and migration in private cloud data centre

R Dhaya, UJ Ujwal, T Sharma… - Wireless …, 2022 - pdfs.semanticscholar.org
Research Article Energy-Efficient Resource Allocation and Migration in Private Cloud Data Centre
Page 1 Research Article Energy-Efficient Resource Allocation and Migration in Private Cloud Data …

An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment

P Rani, PN Singh, S Verma, N Ali… - Wireless …, 2022 - Wiley Online Library
Cloud computing is a system that allows data to be saved in the cloud on a virtual worker.
Outsiders and virtual machines in the cloud worker supplier played a critical part in efficiently …

[Retracted] An Improved Secure Key Generation Using Enhanced Identity‐Based Encryption for Cloud Computing in Large‐Scale 5G

RK Gupta, KK Almuzaini, RK Pateriya… - Wireless …, 2022 - Wiley Online Library
The demand of cloud computing and 5G networks has increased in the current scenario due
to their attractive features and also the security related to the data over the cloud. In the …

Delay‐Driven Opportunistic Routing with Multichannel Cooperative Neighbor Discovery for Industry 4.0 Wireless Networks Based on Power and Load Awareness

A Pai H, KK Almuzaini, L Ali, A Javeed… - Wireless …, 2022 - Wiley Online Library
During data transmission, a decentralised Mobile Ad Hoc Network (MANET) might result in
high Energy Consumption (EC) and a short Network Lifetime (NLife). To address these …

Machine Learning‐Based Data Analytics for IoT‐Enabled Industry Automation

SK Pandey, S Vanithamani, P Shahare… - Wireless …, 2022 - Wiley Online Library
The virtual network which is regarded as a bridge between real‐world applications and
computerized systems is termed Internet of Things (IoT). Internet of Things can access the …

[Retracted] Assessment and Test‐case Study of Wi‐Fi Security through the Wardriving Technique

VO Etta, A Sari, AL Imoize, PK Shukla… - Mobile Information …, 2022 - Wiley Online Library
This study aims to investigate Wireless Local Area Network (WLAN) within the context of its
applicability as a 21st‐century business tool and its survivability in a security threat‐infested …

Realistic prognostic modeling of specific attenuation due to rain at microwave frequency for tropical climate region

J Isabona, AL Imoize, P Rawat… - Wireless …, 2022 - Wiley Online Library
Absorption and scattering of propagated microwave radio signals by atmospheric variables,
particularly rainfall, remained a major cause of propagation attenuation losses and service …

Securing the internet of things via blockchain-aided smart contracts

SM Zanjani, H Shahinzadeh, J Moradi… - … on Information and …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) paradigm is a relatively novel concept that is rapidly and steadily
growing in modern wireless communication models. In IoT, many of the objects in the …