Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

Novel extreme multistable tabu learning neuron: Circuit implementation and application to cryptography

ZT Njitacke, JDD Nkapkop, VF Signing… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The complex dynamics of a simple memristive tabu learning neuron (MTLN) are considered
in this article. The analysis of the stability of its equilibria revealed that it displays self-excited …

A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments

RK Dhanaraj, SKH Islam, V Rajasekar - Wireless Networks, 2022 - Springer
Future communication systems have become the most commonly categorized as Mobile Ad
hoc Networks and Vehicular Ad hoc Network (VANET). A VANET aims to protect vehicle …

[HTML][HTML] Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for internet of things environment

U Ali, MYIB Idris, J Frnda, MNB Ayub, MA Khan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a fast-growing technology that enable existing
systems to communicate with one another by using new devices such as sensors and other …

A machine-learning–blockchain-based authentication using smart contracts for an ioht system

R Gaur, S Prakash, S Kumar, K Abhishek, M Msahli… - Sensors, 2022 - mdpi.com
Nowadays, finding genetic components and determining the likelihood that treatment would
be helpful for patients are the key issues in the medical field. Medical data storage in a …

Image steganography using LSB and hybrid encryption algorithms

M Alanzy, R Alomrani, B Alqarni, S Almutairi - Applied Sciences, 2023 - mdpi.com
In today's era of widespread web technology and cloud computing, ensuring data security
has become a crucial concern across various industries. Instances of data breaches and …

B-UAVM: A Blockchain-Supported Secure Multi-UAV Task Management Scheme

H Xie, J Zheng, T He, S Wei, C Shan… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The advent of unmanned aerial vehicle (UAV) swarm technology brings possibilities to help
humans complete tasks in no man's land, such as deserts and rainforests. However, UAV …

A Literature Review on the Role of Internet of Things, Computer Vision, and Sound Analysis in a Smart Poultry Farm

V Goyal, A Yadav, R Mukherjee - ACS Agricultural Science & …, 2024 - ACS Publications
The rapid growth of human population and frequent changes in environmental conditions
pose challenges in providing nutrient-rich food to the current population. The demand for …

SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things

ASMS Hosen, PK Sharma, D Puthal, IH Ra… - Proceedings of the Third …, 2023 - dl.acm.org
The IoT is widely used in a number of industries and generates large amounts of data. The
data are processed, computed, and stored through distributed computing for analytical …

DNA encoded color image encryption based on chaotic sequence from neural network

C Senthilkumar, M Thirumalaisamy… - Journal of Signal …, 2023 - Springer
Communication in any form requires secrecy to ensure the message is received and
interpreted only by the intended receiver. Fast moving communication technologies enables …