Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

Effective heart disease prediction using hybrid machine learning techniques

S Mohan, C Thirumalai, G Srivastava - IEEE access, 2019 - ieeexplore.ieee.org
Heart disease is one of the most significant causes of mortality in the world today. Prediction
of cardiovascular disease is a critical challenge in the area of clinical data analysis. Machine …

[HTML][HTML] A decentralized privacy-preserving healthcare blockchain for IoT

AD Dwivedi, G Srivastava, S Dhar, R Singh - Sensors, 2019 - mdpi.com
Medical care has become one of the most indispensable parts of human lives, leading to a
dramatic increase in medical big data. To streamline the diagnosis and treatment process …

A survey on security issues in services communication of Microservices‐enabled fog applications

D Yu, Y Jin, Y Zhang, X Zheng - Concurrency and Computation …, 2019 - Wiley Online Library
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …

: An acknowledgement-based mobile sink routing protocol with rechargeable sensors for wireless sensor networks

B Bhushan, G Sahoo - Wireless Networks, 2019 - Springer
The advances in hardware manufacturing technologies and wireless communications
enabled the evolution of tiny, multi-functional, low-power and resource constrained sensor …

A critical review on security approaches to software-defined wireless sensor networking

M Saqib, FZ Khan, M Ahmed… - International Journal of …, 2019 - journals.sagepub.com
Wireless sensor networks (WSNs) are very prone to ongoing security threats due to its
resource constraints and unprotected transmission medium. WSN contains hundreds and …

Differential cryptanalysis of round-reduced speck suitable for internet of things devices

AD Dwivedi, P Morawiecki, G Srivastava - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we focus on differential cryptanalysis of a lightweight ARX cipher. These
ciphers use three simple arithmetic operations, namely, modular addition, bitwise rotation …

A low power WSNs attack detection and isolation mechanism for critical smart grid applications

GS Dhunna, I Al-Anbagi - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are effective tools in many smart grid applications such as
remote monitoring, equipment fault diagnostic, wireless advanced metering infrastructure …

Edge-MapReduce-based intelligent information-centric IoV: Cognitive route planning

C Zhao, M Dong, K Ota, J Li, J Wu - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid development of automatic vehicles (AVs), vehicles have become important
intelligent objects in Smart City. Vehicles bring huge amounts of data for Intelligent …

Deep learning-aided OCR techniques for Chinese uppercase characters in the application of Internet of Things

Y Yin, W Zhang, S Hong, J Yang, J Xiong, G Gui - IEEE Access, 2019 - ieeexplore.ieee.org
Optical character recognition (OCR) has become one of the most important techniques in
computer vision, given that it can easily obtain digital information from various images on the …