A comprehensive study on cybersecurity challenges and opportunities in the IoT world

AN Lone, S Mustajab, M Alam - Security and Privacy, 2023 - Wiley Online Library
It has become possible to link anything and everything to the Internet in recent decades due
to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a …

Prediction-based scheduling techniques for cloud data center's workload: a systematic review

S Kashyap, A Singh - Cluster Computing, 2023 - Springer
A cloud data center provides various facilities such as storage, data accessibility, and
running many specific applications on cloud resources. The unpredictable demand for …

Trust in VANET: A survey of current solutions and future research opportunities

R Hussain, J Lee, S Zeadally - IEEE transactions on intelligent …, 2020 - ieeexplore.ieee.org
Security and privacy will play a pivotal role in the commercialization of Vehicular Ad-hoc
NETworks (VANETs). Traditionally, both cryptographic and non-cryptographic approaches …

Sustainable security for the internet of things using artificial intelligence architectures

C Iwendi, SU Rehman, AR Javed, S Khan… - ACM Transactions on …, 2021 - dl.acm.org
In this digital age, human dependency on technology in various fields has been increasing
tremendously. Torrential amounts of different electronic products are being manufactured …

Fuzzy ELECTRE multi-criteria decision-making technique for achieving reliable data dissemination in MANETs

SM Udhaya Sankar, R Praveen… - International Journal of …, 2023 - Springer
Reliable data dissemination between mobile nodes necessitates cooperation as they are
exchanged in an environment which is self-configuring with a centralized infrastructure. In …

A fuzzy based co-operative blackmailing attack detection scheme for edge computing nodes in MANET-IOT environment

SV Simpson, G Nagarajan - Future Generation Computer Systems, 2021 - Elsevier
Smart cities have been developed with the help of large scale Internet of Things (IoT) device
deployment. Under the combination of IoT and traditional Mobile ad-hoc network, the …

Robust and secure data transmission using artificial intelligence techniques in ad-hoc networks

P Rani, Kavita, S Verma, N Kaur, M Wozniak, J Shafi… - Sensors, 2021 - mdpi.com
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT
model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …

Security assured CNN-based model for reconstruction of medical images on the internet of healthcare things

S More, J Singla, S Verma, U Ghosh… - IEEE …, 2020 - ieeexplore.ieee.org
Medical Imaging is the most significant technique that constitutes information needed to
diagnose and make the right decisions for treatment. These images suffer from inadequate …

Improved grey relational analysis-based TOPSIS method for cooperation enforcing scheme to guarantee quality of service in MANETs

S Jagatheswari, P Ramalingam… - International Journal of …, 2022 - Springer
Mobile ad hoc network (MANET) is a self-configuring and infrastructure less network in
which the nodes are considered to move autonomously through the interfaces of wireless …

Strong and stable Data communication Using Artificial Intelligence method in Mobile Ad-Hoc Networks

G Ramkumar, G Anitha, RT Prabu… - … and Smart Electrical …, 2022 - ieeexplore.ieee.org
Using the idea of machine learning, the authors of this study provide a novel security
mechanism for an Internet of Things model that is built on a mobile ad hoc network …