Oppositional chaos game optimization based clustering with trust based data transmission protocol for intelligent IoT edge systems

M Padmaa, T Jayasankar, S Venkatraman… - Journal of Parallel and …, 2022 - Elsevier
In the past decade, the Internet of Things (IoT) becomes essential in consumer and industrial
applications. The accessibility of high bandwidth Internet connection particularly with the …

An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things

S Gali, V Nidumolu - Cluster Computing, 2022 - Springer
Abstract The Internet of Things (IoT) defines the network of physical objects, commonly used
to interconnect and communicate with other devices through the internet. Security is highly …

An enhanced and Secure Trust-aware improved GSO for encrypted data sharing in the internet of things

P Selvaraj, VK Burugari, S Gopikrishnan, A Alourani… - Applied Sciences, 2023 - mdpi.com
Wireless sensors and actuator networks (WSNs) are the physical layer implementation used
for many smart applications in this decade in the form of the Internet of Things (IoT) and …

Trust aware multi-objective metaheuristic optimization based secure route planning technique for cluster based iiot environment

K Nagappan, S Rajendran, Y Alotaibi - IEEE Access, 2022 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) finds use in several industrial applications like robots,
medical devices, and software-defined manufacturing processes. Apart from the promising …

SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT

S Sujanthi, S Nithya Kalyani - Wireless Personal Communications, 2020 - Springer
In WSN-assisted IoT, energy efficiency and security which play pivotal role in Quality of
Service (QoS) are still challenging due to its open and resource constrained nature …

Atom search sunflower optimization for trust‐based routing in internet of things

PP Jadhav, SD Joshi - International Journal of Numerical …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) is a ubiquitous network that assists the system to monitor
and organize the world by processing, collection, and analysis of produced data by IoT …

Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm

M Jalasri, L Lakshmanan - Cluster Computing, 2023 - Springer
With the development of cloud computing and its technologies, most institutions and users
are interested in storing their sensitive information on third-party servers. Most of the data …

Chaotic whale crow optimization algorithm for secure routing in the IoT environment

MG Raj, SK Pani - International Journal on Semantic Web and …, 2022 - igi-global.com
This paper solves the internet of things (IoT) security issues by introducing a chaotic whale
crow (CWC) optimization, which is the integration of chaotic whale optimization algorithm …

Secure trust aware multi-objective routing protocol based on battle competitive swarm optimization in IoT

NV Rajeesh Kumar, N Jaya Lakshmi, B Mallala… - Artificial Intelligence …, 2023 - Springer
A true routing system for the Internet of Things (IoT), Routing Protocol for Low Power and
Lossy Networks (RPL) offers protection against many types of routing threats. The attacker …

A game-theoretic approach for enhancing security and data trustworthiness in IoT applications

MS Abdalzaher, O Muta - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSNs)-based Internet of Things (IoT) are among the fast
booming technologies that drastically contribute to different systems' management and …