Maximizing IoT Security: An Examination of Cryptographic Algorithms

L Arya, YK Sharma, R Kumar… - … on Power Energy …, 2023 - ieeexplore.ieee.org
The proliferation of Internet of Things (IoT) devices has created a ubiquitous network of
interconnected sensors and devices that generate and exchange vast amounts of data. With …

An intelligent buffalo-based secure edge-enabled computing platform for heterogeneous IoT network in smart cities

RR Irshad, S Hussain, I Hussain, I Ahmad… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) based smart city applications are the latest technology-driven
solutions designed to collect and analyze data to enhance the quality of life for urban …

Energy-Optimization Route and Cluster Head Selection Using M-PSO and GA in Wireless Sensor Networks

V Prakash, D Singh, S Pandey, S Singh… - Wireless Personal …, 2024 - Springer
Wireless sensor network (WSN) clustering techniques play a crucial role in extending the
network's lifespan through various methods. In WSN, the clustering techniques elect the best …

[HTML][HTML] OO-MA-KP-ABE-CRF: Online/Offline Multi-Authority Key-Policy Attribute-Based Encryption with Cryptographic Reverse Firewall for Physical Ability Data

Y Zhao, Y Fan, X Bian - Mathematics, 2023 - mdpi.com
In many universities, students' physical ability data are collected and stored in the cloud
through various sensing devices to save computational and storage costs. Therefore, how to …

Towards a Greener Tomorrow: IoT-Enabled Smart Environment Monitoring Systems

L Arya, YK Sharma, R Kumar - 2023 International Conference …, 2023 - ieeexplore.ieee.org
Integrating IoT technology into environmental monitoring systems offers solutions to
contemporary sustainability challenges. This study explores IoT's potential to enhance …

Challenges and Key Issues in IoT Privacy and Security

AB Kathole, VV Kimbahune, SD Patil… - … and Security Challenges …, 2024 - Springer
Abstract “Internet of Things”(IoT) refers to a system that enables the interconnection of many
different types of things and intelligent devices. In order to function, devices connected to the …

Energy aware optimal routing model for wireless multimedia sensor networks using modified Voronoi assisted prioritized double deep Q‐learning

S Suseela, R Krithiga, M Revathi… - Concurrency and …, 2024 - Wiley Online Library
The energy hole problem is critical in Wireless Multimedia Sensor Network (WMSN),
wherein the nodes closer to the sink node will expire sooner than the outer sub‐regions …

IoT Communication Models and Modes of Connectivity

A Prasad, P Kapoor, TP Singh - … and Security Challenges in IoT: Present …, 2024 - Springer
The IoT is a rapidly growing field that enables communication with various devices and
objects. It allows for the exchange of information within physical objects and virtual …

Clustering Based Hybrid Optimized Model for Effective Data Transmission

N Durga, T Gayathri, KR Kumari, T Madhavi - International Conference on …, 2023 - Springer
Abstract The Internet of Things (IoT) is a system of unified gadgets that can conversation
data and operate in tandem thanks to the web. When it comes to the longevity of a network …

Exploring IoT Frameworks: An In-Depth Analysis and Survey of Security Protocols

NR Chandrika, DL Arya - Available at SSRN 4746559, 2024 - papers.ssrn.com
The security issues associated with IoT applications are often not properly addressed due to
the complexity of the IoT threat landscape. One of the most critical factors that can be …