A novel community-based trust aware recommender systems for big data cloud service networks

BD Deebak, F Al-Turjman - Sustainable Cities and Society, 2020 - Elsevier
Abstract Internet of Things (IoT) has enhanced the appearance of the information and
communications technology (ICT) infrastructure of smart sustainable cities that emerge as a …

A closed-loop control architecture of UAV and WSN for traffic surveillance on highways

N Bashir, S Boudjit, S Zeadally - Computer Communications, 2022 - Elsevier
Excessive speed is the leading cause of accidents on highways. The use of fixed road-side
surveillance systems has proven ineffective because people take caution around only those …

HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments

N Mazumdar, A Nag, S Nandi - Ad Hoc Networks, 2021 - Elsevier
The primary issue in Wireless Sensor Network (WSN) based monitoring applications is the
preservation of the sensing coverage under the harsh physical environment. WSN forms the …

A trusted distributed routing scheme for wireless sensor networks using blockchain and meta‐heuristics‐based deep learning technique

M Revanesh, V Sridhar - Transactions on Emerging …, 2021 - Wiley Online Library
The wireless sensor network (WSN) with fluctuating environs might be susceptible to diverse
types of malicious cyber‐attacks, and they are mostly dependent on the authentication and …

Improved blowfish algorithm-based secure routing technique in IoT-based WSN

M Alotaibi - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) has gained popularity with the growth and prospects of smart
networks. It is intended to exploit the network edges, which enables smart service and …

Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks

K Lakshmi Narayanan, R Santhana Krishnan… - Wireless Personal …, 2021 - Springer
Wireless sensor network allows nodes to communicate with another using wireless
channels so that it is necessary for packet delivery to the nodes. Black hole attack occurs …

[HTML][HTML] Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments

CT Chen, CC Lee, IC Lin - Plos one, 2020 - journals.plos.org
In the Internet of Things (IoT), numerous devices can interact with each other over the
Internet. A wide range of IoT applications have already been deployed, such as …

Cross layered cryptography based secure routing for IoT-enabled smart healthcare system

A Kore, S Patil - Wireless Networks, 2022 - Springer
Abstract The Internet of Things (IoT) empowered smart city applications like e-healthcare
received serious attention, especially in pandemic situations. Wireless Sensor Networks …

An energy and coverage sensitive approach to hierarchical data collection for mobile sink based wireless sensor networks

S Roy, N Mazumdar, R Pamula - Journal of Ambient Intelligence and …, 2021 - Springer
In recent years, wireless sensor networks experience the energy hole problem as the most
critical issue due to the heavy data forwarding load on the proximate sensor nodes to the …

Comprehensive survey of routing protocols for Mobile Wireless Sensor Networks

A Rady, ELSM El‐Rabaie, M Shokair… - International Journal …, 2021 - Wiley Online Library
Summary Mobile Wireless Sensor Networks (MWSNs) have emerged as a new evolution
trend in Wireless Sensor Networks (WSNs) technology as a result of the growth and …