Securing IoT Sensors Using Sharding-Based Blockchain Network Technology Integration: A Systematic Review

A Aslam, O Postolache, S Oliveira, JD Pereira - Sensors, 2025 - mdpi.com
Sharding is an emerging blockchain technology that is used extensively in several fields
such as finance, reputation systems, the IoT, and others because of its ability to secure and …

Seagull Optimization Algorithm with Share Creation with an Image Encryption Scheme for Secure Vehicular Ad Hoc Networks

R Mohan, G Prabakaran… - Engineering, Technology & …, 2024 - etasr.com
Abstract Α Vehicular Ad hoc Network (VANET) allows transmission, amid moving or
stationary vehicles via wireless technology. Amongst several problems, safe transmission is …

A fast verifiable fully homomorphic encryption technique for secret computation on cloud data

GK Mahato, SK Chakraborty - International Journal of Information …, 2024 - Springer
In the domain of cloud computing, safeguarding the confidentiality and integrity of
outsourced sensitive data during computational processes is of utmost importance. This …

Empirical Study of Fully Homomorphic Encryption Using Microsoft SEAL

FJ Valera-Rodriguez, P Manzanares-Lopez… - Applied Sciences, 2024 - mdpi.com
In the context of the increasing integration of Internet of Things technologies and the growing
importance of data lakes, the need for robust cybersecurity measures to protect privacy …

DyClust: A Hybrid Key Management Scheme for Wireless Sensor Network

G Srivastava, JN Singh, M Manjul, A Paul - SN Computer Science, 2024 - Springer
Wireless sensor network (WSN) has a variety of applications, differ in size, and are used in a
range of environments. Many applications that use WSN need secure communication …

Securing UAV Communications with Homomorphic Encryption and Key Regeneration: A Model Checking Approach.

MY Alzahrani - International Journal of Advances in Soft …, 2024 - search.ebscohost.com
Abstract Unmanned Aerial Vehicles (UAVs) are at the centre of multiple applications across
various fields, including delivery, disaster response, and surveillance. However, its use of …