Physical-layer authentication based on hierarchical variational autoencoder for industrial internet of things

R Meng, X Xu, B Wang, H Sun, S Xia… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Recently, physical-layer authentication (PLA) has attracted much attention since it takes
advantage of the channel randomness nature of transmission media to achieve …

Capbad: Content-agnostic, payload-based anomaly detector for industrial control protocols

J Cai, Q Wang, J Luo, Y Liu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Efficient anomaly detection methods are urgently needed to prevent attacks in the
application layer of the Industrial Internet of Things (IIoT). The existing intrusion detection …

[HTML][HTML] PPSEB: a postquantum public-key searchable encryption scheme on blockchain for E-healthcare scenarios

G Xu, S Xu, Y Cao, F Yun, Y Cui, Y Yu… - Security and …, 2022 - hindawi.com
In the current E-healthcare scenarios, medical institutions are used to encrypt the
information and store it in an Electronic Health Record (EHR) system in order to ensure the …

[HTML][HTML] SecAODV: A secure healthcare routing scheme based on hybrid cryptography in wireless body sensor networks

H Jeong, SW Lee, M Hussain Malik… - Frontiers in …, 2022 - frontiersin.org
In recent decades, the use of sensors has dramatically grown to monitor human body
activities and maintain the health status. In this application, routing and secure data …

A secure routing approach based on league championship algorithm for wireless body sensor networks in healthcare

M Hosseinzadeh, AH Mohammed, AM Rahmani… - Plos one, 2023 - journals.plos.org
Patients must always communicate with their doctor for checking their health status. In recent
years, wireless body sensor networks (WBSNs) has an important contribution in Healthcare …

A measurement study on device-to-device communication technologies for IIoT

F Li, Z Guo, B Liang, X Yi, X Wang, W Li, Y Wang - Computer Networks, 2021 - Elsevier
Abstract Industrial Internet of Things (IIoT) connect all components of the factory by
constructing low-delay and high-reliability network (wired or wireless), realizing ubiquitous …

An improvised algorithm for a dynamic key generation model

DVG Saran, K Jain - … and Information Technologies: Proceedings of ICICIT …, 2023 - Springer
Data may be kept private, secure, and authentic via cryptography. Computational resources
and communication channel performance impede the development of an efficient key …

Multi-Objective MDP-based Routing In UAV Networks For Search-based Operations

P Mahajan, P Balamurugan, A Kumar… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) systems have gained widespread recognition due to their
versatility and autonomy. Their deployment for disaster mitigation and management …

Research on an optimised encryption algorithm for network information security communication

J Li - International Journal of Communication Networks and …, 2023 - inderscienceonline.com
At present, one of the commonly used encryption algorithms is the block cipher AES method,
while in the design, we often only consider the bounded attack opponent, but in the face of …

[PDF][PDF] Feistel Network Assisted Dynamic Keying based SPN Lightweight Encryption for IoT Security

PG Krishna, N Muthuluru - International Journal of …, 2021 - pdfs.semanticscholar.org
In the last few years Internet-of-Things (IoT) technology has emerged significantly to serve
varied purposes including healthcare, surveillance and control, business communication …