[HTML][HTML] An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN

K Haseeb, A Almogren, N Islam, I Ud Din, Z Jan - Energies, 2019 - mdpi.com
Due to the advancement of information and communication technologies, the use of Internet
of Things (IoT) devices has increased exponentially. In the development of IoT, wireless …

Authentication and privacy preservation in IoT based forest fire detection by using blockchain–a review

S Datta, AK Das, A Kumar, Khushboo… - … Conference on Internet of …, 2020 - Springer
Abstract Internet of Things (IoT) has garnered a good chunk of limelight with the emerging
advancements in technologies. It comprises of heterogeneous devices embedded with …

Clustering algorithms in MANETs: a review

M Alinci, E Spaho, A Lala… - 2015 ninth international …, 2015 - ieeexplore.ieee.org
A Mobile Ad hoc Network (MANET) is a multihop wireless network in which the mobile
nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due …

An intrusion detection and prevention protocol for internet of things based wireless sensor networks

R Krishnan, RS Krishnan, YH Robinson… - Wireless Personal …, 2022 - Springer
Because of the heavy data and communication advances, the utilization of Internet of Things
(IoT) gadgets has expanded dramatically. In the improvement of IoT, Wireless Sensor …

New strategies and extensions in weighted clustering algorithms for mobile ad hoc networks

M Aissa, A Belghith, K Drira - Procedia Computer Science, 2013 - Elsevier
We study the problem of constructing a novel framework for dynamically organizing mobile
nodes in wireless ad-hoc networks into clusters where it is necessary to provide robustness …

A fuzzy approach for secure clustering in MANETs: effects of distance parameter on system performance

K Ozera, T Inaba, D Elmazi, S Sakamoto… - 2017 31st …, 2017 - ieeexplore.ieee.org
A Mobile Ad hoc Network (MANET) is a multihop wireless network in which the mobile
nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due …

A decision procedure for term algebras with queues

KR Apt - ACM Transactions on Computational Logic (TOCL), 2001 - dl.acm.org
In software verification it is often required to prove statements about heterogeneous domains
containing elements of various sorts, such as counters, stacks, lists, trees and queues. Any …

An efficient secure group communication in MANET using fuzzy trust based clustering and hierarchical distributed group key management

K Gomathi, B Parvathavarthini… - Wireless Personal …, 2017 - Springer
Secure group communication is desired in many group oriented applications of mobile ad
hoc network (MANET), and fruitful communication achieved only via trustable network …

[HTML][HTML] On-demand computation offloading architecture in fog networks

Y Jin, HJ Lee - Electronics, 2019 - mdpi.com
With the advent of the Internet-of-Things (IoT), end-devices have been served as sensors,
gateways, or local storage equipment. Due to their scarce resource capability, cloud-based …

Quality of Clustering in mobile Ad Hoc networks

M Aissa, A Belghith - Procedia Computer Science, 2014 - Elsevier
We consider the problem of appropriate clusterhead selection in wireless ad-hoc networks
where it is necessary to provide robustness in the face of topological changes caused by …