Drivers for Internet of Things (IoT) adoption in supply chains: Implications for sustainability in the post-pandemic era

SM Ali, MA Ashraf, HMM Taqi, S Ahmed… - Computers & Industrial …, 2023 - Elsevier
As the post-COVID-19 pandemic era begins, the supply chain operating environment has
transformed and faced disruptions. The Internet of Things (IoT) has emerged as one of the …

[HTML][HTML] A Review of blockchain technology in knowledge-defined networking, its application, benefits, and challenges

PADSN Wijesekara, S Gunawardena - Network, 2023 - mdpi.com
Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the
generation of knowledge, typically using machine learning techniques, and the …

Detection of Denial-of-Service Attack in Wireless Sensor Networks: A lightweight Machine Learning Approach

MA Elsadig - IEEE Access, 2023 - ieeexplore.ieee.org
The characteristics and performance of wireless sensor networks (WSNs) are the main
reasons for their rapid expansion in various fields. However, these networks are extremely …

Security attacks in opportunistic mobile networks: A systematic literature review

A Altaweel, S Aslam, I Kamel - Journal of Network and Computer …, 2023 - Elsevier
Abstract Opportunistic Mobile Networks (OMNs), also known as Delay Tolerant Networks
(DTNs), refer to wireless networks in which the mobile nodes (eg, smartphones, tablets …

[HTML][HTML] Towards a lightweight security framework using blockchain and machine learning

S Ismail, M Nouman, DW Dawoud, H Reza - Blockchain: Research and …, 2024 - Elsevier
Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor
networks, necessitating the development of robust countermeasures tailored to their unique …

[HTML][HTML] special issue on security and privacy in blockchains and the IoT volume II

C Stach, C Gritti - Future Internet, 2023 - mdpi.com
In this day and age, data are indispensable commodities and have become an integral part
of our daily lives. In fact, it is no coincidence that data are referred to as the oil of the 21st …

Secure Data Transmission Scheme in Wireless Sensor Network Resisting Unknown Lethal Threats

C Puttaswamy, NPK Shivaprasad - Proceedings of the Computational …, 2023 - Springer
Security data transmission has been a critical concern in Wireless Sensor Network (WSN)
irrespective of secured routing protocols evolved in past decades. There are emerging new …

Machine Learning Algorithms to Detect Attacks in Wireless Sensor Networks

N Jagwani, G Poornima - International Journal of Intelligent Systems and …, 2024 - ijisae.org
A network of independent and interconnected sensor nodes that communicate with each
other wirelessly to collect, process, and transmit data from the environment they are …

Environmental, Social, and Governance Factors in Transportation Planning

NG Kuftinova, AV Ostroukh… - … Electronic Devices in …, 2023 - ieeexplore.ieee.org
This article discusses the issue of digital maturity and the use of IT trends, as well as how to
use the Environmental, Social and Governance (ESG) methodology for the digital …

An Adaptive Secure Timestamp-Based Replay Attack Detection System For Wsns

GN Babu, KH Krishna, KV Rao - … of Intelligent Systems and Applications in …, 2024 - ijisae.org
Abstract Wireless Sensor Networks (WSNs) are essential in many fields because they
enable real-time data gathering and transmission possible for a wide range of applications …