Cryptographic Techniques for Data Privacy in Digital Forensics

TB Ogunseyi, OM Adedayo - IEEE Access, 2023 - ieeexplore.ieee.org
The acquisition and analysis of data in digital forensics raise different data privacy
challenges. Many existing works on digital forensic readiness discuss what information …

An optimized meta‐heuristic clustering‐based routing scheme for secured wireless sensor networks

G Kiran Kumar, SK Prashanth… - International Journal …, 2024 - Wiley Online Library
Privacy and security present significant challenges in wireless sensor networks (WSNs). In
order to enhance security, the sensor network is equipped with high throughput. While the …

Enhancing IoT security in wireless local area networks through dynamic vulnerability scanning

P SENTHILRAJA, P NANCY, J SHERINE GLORY… - Sādhanā, 2024 - Springer
Wireless local area networks (WLANs) play a crucial role in the internet of things (IoT)
landscape, facilitating constant data exchange among devices. However, the inherent …

Optimizing Waste Management through IoT and Analytics: A Case Study Using the Waste Management Optimization Test

MF Kuzhin, A Joshi, V Mittal, M Khatkar… - BIO Web of …, 2024 - bio-conferences.org
This research examines how Internet of Things (IoT) technology and advanced analytics
may be integrated into trash management. The results show a notable improvement in waste …

IoT-Enhanced Public Safety in Smart Environments: A Comparative Analysis Using the Public Safety IoT Test

N Shchepkina, GS Negi, L Bhalla… - BIO Web of …, 2024 - bio-conferences.org
The present study does a comparative analysis to evaluate the efficacy of public safety
measures boosted by the Internet of Things (IoT) in various smart settings. The" Public …

AdaPtive and rObust Key pre‐distribution for multi‐phase IoT networks

ML Messai - International Journal of Communication Systems - Wiley Online Library
Summary Internet of Things (IoT) networks continue to be deployed and play a crucial role in
our daily life. Thus, ensuring their security is of utmost importance. This necessitates the use …