Software defined networking for internet of things: review, techniques, challenges, and future directions

MA Al-Shareeda, AA Alsadhan, HH Qasim… - Bulletin of Electrical …, 2024 - beei.org
Security networks as one of the biggest issue for network managers with the exponential
growth of devices connected to the internet. Keeping a big and diverse network running …

Energy harvesting in self-sustainable IoT devices and applications based on cross-layer architecture design: A survey

A Banotra, S Ghose, D Mishra, S Modem - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) is envisioned to become a driving force in the evolution
of fifth-generation (5G) mobile networks, autonomous continuous monitoring and control …

Security and privacy in IoT-based Smart Farming: a review

IA Ali, WA Bukhari, M Adnan, MI Kashif… - Multimedia Tools and …, 2024 - Springer
Abstract The Internet of Things (IoT) is no longer a newbie; it has a long history of serving as
the primary commercial growth driver. Every business nowadays has begun to rely on IoT …

ALNet: An adaptive channel attention network with local discrepancy perception for accurate indoor visual localization

H Gao, K Dai, K Wang, R Li, L Zhao, M Wu - Expert Systems with …, 2024 - Elsevier
Visual localization, a fundamental component of several computer vision tasks, has been
predominantly realized by scene coordinate regression (SCoRe) techniques. These …

A novel intrusion detection system for internet of things devices and data

A Kaushik, H Al-Raweshidy - Wireless Networks, 2024 - Springer
As we enter the new age of the Internet of Things (IoT) and wearable gadgets, sensors, and
embedded devices are extensively used for data aggregation and its transmission. The …

Improvement of energy-efficient resources for cognitive internet of things using learning automata

P Rahmani, M Arefi - Peer-to-Peer Networking and Applications, 2024 - Springer
The increasing demand for data collection from various Internet of Things (IoT) devices and
limited energy of nodes in these networks led to the complex network conditions. Currently …

Implementation and analysis of recombination techniques within the receiver for IoT based applications

S Elaage, M El Ghzaoui, N Mrani, R El Alami - Wireless Networks, 2024 - Springer
The growing popularity of IoT (Internet of Things) and its applications is evident from the
increasing number of connected devices and IoT services. To enable connectivity for these …

[PDF][PDF] Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies

M Raeisi-Varzaneh, O Dakkak… - Journal of …, 2024 - researchgate.net
Internet of Things can be characterized as a collection of interconnected devices. In the
context of the Internet of Things, a thing refers to any object, such as a sensor, that forms a …

Performance Evaluation of Federated Learning for Anomaly Network Detection

R Alhammadi, A Gawanmeh, S Atalla… - 2023 Congress in …, 2023 - ieeexplore.ieee.org
Network anomaly detection is crucial for ensuring the security and dependability of modern
networked systems. Traditional machine learning methods face scalability, data security …

Understanding the Impact of IoT Security Patterns on CPU Usage and Energy Consumption on IoT Devices

S Jamshidi, A Nikanjam, N Kawser, F Khomh… - Authorea …, 2024 - techrxiv.org
Abstract The Internet of Things (IoT) has given rise to numerous security issues that require
effective solutions. IoT security patterns have been suggested as an effective approach to …