R Mahmud, K Ramamohanarao, R Buyya - ACM Computing Surveys …, 2020 - dl.acm.org
The Internet of Things (IoT) paradigm is being rapidly adopted for the creation of smart environments in various domains. The IoT-enabled cyber-physical systems associated with …
5G edge computing enabled Internet of Medical Things (IoMT) is an efficient technology to provide decentralized medical services while device-to-device (D2D) communication is a …
Nowadays, energy-efficient data transmission is one of the biggest challenges in Wireless Sensor Networks (WSNs). Therefore, various routing protocols were developed to minimize …
M Nikravan, MH Kashani - Journal of Network and Computer Applications, 2022 - Elsevier
Cloud computing provides software, infrastructure, and platform as services and reduces the cost of usage for cloud customers. Recently, a system architecture called Fog and Edge …
L Wei, Y Yang, J Wu, C Long… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Driven by the rapid development of the Internet of Things (IoT) technology, the issue of trust has become increasingly apparent and received considerable scholarly attention in recent …
R Sabitha, AP Shukla, A Mehbodniya… - Adhoc & Sensor …, 2022 - search.ebscohost.com
One of the primary challenges in Wireless Sensor Networks (WSNs) is security. This research proposes an efficient fuzzy trust evaluation of cloud collaboration outlier detection …
Y Han, H Hu, Y Guo - IEEE Access, 2022 - ieeexplore.ieee.org
Due to their working environments, limited resources and communication characteristics, wireless sensor networks face some challenges including energy optimization and security …
JA Alzubi - Transactions on Emerging Telecommunications …, 2021 - Wiley Online Library
Attack detection is a significant problem to be resolved to attain security in industrial sensor network. Few research works have been designed for performing attack discovery process …
A Pathak, I Al-Anbagi… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The limited resources and low computational power of wireless sensor networks (WSNs) make them vulnerable to various security attacks. Conventional security mechanisms …