The Internet of Things (IoT) has revolutionized the world, connecting billions of devices that offer assistance in various aspects of users' daily lives. Context-aware IoT applications …
MA Elsadig - IEEE Access, 2023 - ieeexplore.ieee.org
The characteristics and performance of wireless sensor networks (WSNs) are the main reasons for their rapid expansion in various fields. However, these networks are extremely …
Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor networks, necessitating the development of robust countermeasures tailored to their unique …
BS Samantray, K Reddy - Cluster Computing, 2024 - Springer
Recently, the spotlight has been cast on smart healthcare by many researchers to provide better facilities to patients. Improved services, such as reducing health hazards, monitoring …
S Gayathri, D Surendran - Journal of Cloud Computing, 2024 - Springer
Abstract Anomaly detection in Wireless Sensor Networks (WSNs) is critical for their reliable and secure operation. Optimizing resource efficiency is crucial for reducing energy …
M Faisal, G Husnain - Wireless Personal Communications, 2023 - Springer
Abstract In Wireless Sensor Networks, nodes have resource constraints such as storage capacity, low energy, and computational power, etc. Due to which it directly affects the …
K Ashok, S Gopikrishnan - Journal of Information Security and Applications, 2024 - Elsevier
Abstract It proposes a Hybrid Secure Signcryption Algorithm (HySSA), a small-size block chain (BC), and a planned system that secures an electronic health record (EHR) exchange …
G Wang, Y Li, R Liu, F Tong, J Pan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Privacy-preserving localization plays a crucial role in enabling various applications on the Internet of Things (IoT). Existing work applies random zero-sum noise to develop privacy …
F Alserhani - Applied Artificial Intelligence, 2024 - Taylor & Francis
At present, encrypted data is the cornerstone of Internet communication, providing the maximum degree of privacy and security protection for all transmitted data while shielding …