Abstract The Key Policy Attribute-based Encryption (KPABE) standard arises as the utmost appropriate security system for public key encipherment. KP-ABE has been extensively …
The prevalence of IoT based technology in contemporary society allows for the planning of smart city infrastructure with individually owned devices as participating nodes in a social …
In recent years, the existence of a significant cross-impact between Cloud computing and Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …
This paper presents an energy and task completion time minimization scheme for the unmanned aerial vehicles (UAVs)-empowered mobile edge computing (MEC) system …
Authentication is one of the foremost pillars in the Internet of Things (IoT) security that authenticates the identity of a device or a person with the help of a unique identification …
A difficult problem to solve concerns the secure installation and startup of devices connected to the Internet of Things (IoT) via the Internet. To provide additional value-added services …
L Wang, H Ma, Y Jiang, Y Tang, S Zu, T Hu - Scientific Reports, 2022 - nature.com
Segment routing (SR) technology is a new network functional technology derived from MPLS technology and based on SDN. Combining SR with software-defined perimeter …
X Chen, H Liu, Q Huang, D Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Due to limited memory usage and provably high accuracy, sketches running on programmable switches have been commonly used by the literature for network …
CS Priya, J Thangakumar… - … on Networking and …, 2023 - ieeexplore.ieee.org
In the field of Renewable energy, data processing is occurring in the photovoltaic plant using the IoT data logger. A data logger is a piece of technology that records and stores data over …