Trusted Personalized and Contextualized E-Commerce Services for Consumer Electronics over Wireless Sensor Network

AA Deshmukh, M Alsaadi, RV Pamba… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Wireless sensor network-based edge computing (WEC) technology enables e-commerce to
provide reliable and real-time services over the wireless sensor network (WSN). To enable …

Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques

M Karthiga, A Indirani, S Sankarananth… - Wireless …, 2023 - Wiley Online Library
Nearly everyone has at least one internet‐connected gadget in the connected world these
days. As the number of these gadgets grows, it's critical to create a security policy to reduce …

Dragon-MAC: Securing wireless sensor networks with authenticated encryption

SY Lim, CC Pu, HT Lim, HJ Lee - Cryptology ePrint Archive, 2007 - eprint.iacr.org
Sensor networks offer economically viable monitoring solutions for a wide variety of
applications. In order to combat the security threats that sensor networks are exposed to, a …

[HTML][HTML] 1 Overview of Security in a Wireless Environment

NM Haddad, M sabah Mustafa, HS Salih, MM Jaber… - journals.riverpublishers.com
Internet of Things (IoT) technologies are swiftly created and widely applied as information
technology progresses in the environment, transportation, medical care, agriculture, and …

An Industrial Wireless Sensors Networks for Securing Anonymous Mutual Authentication Protocol in Real-Time Data Access

D Sharma - 2023 3rd International Conference on Smart …, 2023 - ieeexplore.ieee.org
When it comes to energy consumption, coverage, connection, and security, Industrial
Wireless Sensor Networks (IWSNs) are a subset of WSNs that are only beginning to emerge …

Charging wireless sensor network security technology based on encryption algorithms and dynamic model

Y Li, W Guo, X Meng, W Xia - International Journal of …, 2020 - journals.sagepub.com
With the popularization of the Internet, the related information technology is developing
faster and faster, and the scale and complexity of the network are also increasing. Wireless …

ESTADO—Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online

C Lesjak, T Ruprechter, H Bock, J Haid… - The 9th International …, 2014 - ieeexplore.ieee.org
The advent of initiatives like Industry 4.0 promises increased operational efficiency through
smart services and interconnected devices. To enable smart maintenance services for …

Energy proficient hybrid secure scheme for wireless sensor networks

M Yuvaraju, KA Pranesh - Wireless Personal Communications, 2021 - Springer
One way hash chain with a new key indicating the performance of the node as well to isolate
malicious nodes from the network. Public key cryptography is derived using elliptical curve …

[PDF][PDF] Design and implementation of flexible framework for secure wireless sensor network applications

I Trilok, MU Patil - International Journal of Computer Science and …, 2010 - academia.edu
Secure communications is an interesting and challenging research area in Wireless Sensor
Networks (WSN) fundamentally because of the low power constraints and small memory …

An attribute-based keyword search scheme for multiple data owners in cloud-assisted Industrial Internet of Things

H Yin, Y Li, H Deng, W Zhang, Z Qin… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The cloud-assisted industrial Internet of Things (IIoT) architecture can sustain highly
available computation and massive storage services for modern industrial systems. When …