A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

Optimization Algorithms for Wireless Sensor Networks Node Localization: An Overview

R Ahmad, W Alhasan, R Wazirali, N Aleisa - IEEE Access, 2024 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) play a critical role in numerous applications, and
accurate localization of sensor nodes is vital for their effective operation. In recent years …

Smart remote sensing network for disaster management: an overview

R Ahmad - Telecommunication Systems, 2024 - Springer
Remote sensing technology is a vital component of disaster management, poised to
revolutionize how we safeguard lives and property through enhanced prediction, mitigation …

Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0

FF Ashrif, EA Sundararajan, MK Hasan… - Computer …, 2024 - Elsevier
Industry 4.0 and the industrial Internet of Things (IIoT) aim to create a platform for data-driven
decision-making through machine-to-machine (M2M) communication, often facilitated by the …

Enhanced drift self-calibration of low-cost sensor networks based on cluster and advanced statistical tools

R Ahmad - Measurement, 2024 - Elsevier
The escalating use of low-cost sensors in environmental monitoring demands effective
management of sensor drift and errors. To tackle this challenge, lightweight calibration …

[HTML][HTML] Flexible Sensing Enabled Nondestructive Detection on Viability/Quality of Live Edible Oyster

P Liu, X Qu, X Zhang, R Ma - Foods, 2024 - mdpi.com
Environmental and physiological fluctuations in the live oyster cold chain can result in
reduced survival and quality. In this study, a flexible wireless sensor network (F-WSN) …

Detecting malicious proxy nodes during IoT network joining phase

A Haj-Hassan, Y Imine, A Gallais, B Quoitin - Computer Networks, 2024 - Elsevier
During the joining phase of an IoT network, when a node plays the role of a proxy node, it
becomes responsible for forwarding Join Requests and Join Responses between the …

A highly effective algorithm for mitigating and identifying congestion through continuous monitoring of IoT networks, improving energy consumption

RS Abujassar - Wireless Networks, 2024 - Springer
Abstract The Internet of Things (IoT) consists of non-standardized computer devices that can
create wireless network connections to send data. These devices have limited storage …

A lightweight authentication scheme for 6LoWPAN-based Internet-of-things

LC Thungon, SC Sahana, I Hussain - Information Security Journal …, 2024 - Taylor & Francis
IPv6-based IoT networks, ie 6LoWPAN network, require authentication for security. The
existing authentication schemes on symmetric-key based approaches for 6LoWPAN …

[HTML][HTML] An ECC-Based Authentication Protocol for Dynamic Charging System of Electric Vehicles

J Wang, S Wang, K Wen, B Weng, X Zhou, K Chen - Electronics, 2024 - mdpi.com
Dynamic wireless charging emerges as a promising technology, effectively alleviating range
anxiety for electric vehicles in transit. However, the communication between the system's …