A comprehensive review of the state-of-the-art on security and privacy issues in healthcare

A López Martínez, M Gil Pérez… - ACM Computing …, 2023 - dl.acm.org
Currently, healthcare is critical environment in our society, which attracts attention to
malicious activities and has caused an important number of damaging attacks. In parallel …

Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions

E Alalwany, I Mahgoub - Sensors, 2024 - mdpi.com
The Internet of Vehicles (IoV) is a technology that is connected to the public internet and is a
subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a …

Enabling artificial intelligence of things (AIoT) healthcare architectures and listing security issues

AA Pise, KK Almuzaini, TA Ahanger… - Computational …, 2022 - Wiley Online Library
A significant study has been undertaken in the areas of health care and administration of
cutting‐edge artificial intelligence (AI) technologies throughout the previous decade …

Improved secure encryption with energy optimization using random permutation pseudo algorithm based on internet of thing in wireless sensor networks

S Nagaraj, AB Kathole, L Arya, N Tyagi, SB Goyal… - Energies, 2022 - mdpi.com
The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this
expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low …

[Retracted] Analysis of Privacy‐Preserving Edge Computing and Internet of Things Models in Healthcare Domain

N Almusallam, A Alabdulatif… - … Mathematical Methods in …, 2021 - Wiley Online Library
The healthcare sector is rapidly being transformed to one that operates in new computing
environments. With researchers increasingly committed to finding and expanding healthcare …

'Un'-blocking the industry 4.0 value chain with cyber-physical social thinking

S Mendhurwar, R Mishra - Enterprise Information Systems, 2023 - Taylor & Francis
Integration of diverse technologies fuels business-model transformation, evolving new
applications. Industry 4.0 utilizes emerging-technologies like IoT, AI to make next-generation …

An SDN empowered location aware routing for energy efficient next generation vehicular networks

K Renuka, DS Roy, KHK Reddy - IET Intelligent Transport …, 2021 - Wiley Online Library
With the ever expanding and all pervasive growth of information and communication
technologies, vehicular ad‐hoc networks (VANETs) have been found wanting for …

A generic model of the pseudo-random generator based on permutations suitable for security solutions in computationally-constrained environments

T Unkašević, Z Banjac, M Milosavljević - Sensors, 2019 - mdpi.com
Symmetric cryptography methods have an important role in security solutions design in data
protection. In that context, symmetric cryptography algorithms and pseudo-random …

Fuzzy enhanced black widow spider with secure encryption random permutation pseudo algorithm for energy efficient cluster communication in wsn

MSS Sasikumar, AE Narayanan - Journal of Advanced …, 2023 - semarakilmu.com.my
Devices connected to the Internet of Things (IoT) are increasingly being used. Modern
mobile apps may be incorporated onto low-cost, low-power devices with the help of these …

[HTML][HTML] PROTOCOLS FOR SYMMETRIC SECRET KEY ESTABLISHMENT MODERN APPROACH

G Meiran, BZ Dj - Vojnotehnički glasnik, 2022 - cyberleninka.ru
Introduction/purpose: The problem of efficient distribution of crypto graphic keys in
communication systems has existed since its first days and is especially emphasized by the …