Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review

E Ebrahimpour, S Babaie - International Journal of Information Security, 2024 - Springer
Abstract Internet of Things (IoT) as an emerging technology is based on the idea that smart
things can connect to the Internet and exchange the collected data in a peer-to-peer …

A new intrusion detection system based on SVM–GWO algorithms for Internet of Things

H Ghasemi, S Babaie - Wireless Networks, 2024 - Springer
Abstract Internet of Things (IoT) as an emerging technology is widely used in various
applications such as remote healthcare, smart environment, and intelligent transportation …

An adaptive traffic engineering approach based on retransmission timeout adjustment for software-defined networks

H Zangoulechi, S Babaie - Journal of Ambient Intelligence and Humanized …, 2024 - Springer
Traffic engineering of software-defined networks (SDNs) refers to network traffic monitoring
and network status analysis to improve network performance, which can be achieved by …

A semantic model for building the Vietnamese language query processing framework in e-library searching application

DT Nguyen, TN Pham, QT Phan - 2010 Second International …, 2010 - ieeexplore.ieee.org
This paper aims to establish a semantic model which is the most important and central
component of our Vietnamese Language Query Processing (VLQP) framework. The VLQP …

Replicated cache agent technique for wireless sensor network

S Kumari, R Scholar, SS Sran - 2015 Fifth International …, 2015 - ieeexplore.ieee.org
The sensor nodes are battery powered devices, they communicate over a wireless medium
and consumes energy during data transmission/reception. The main task in wireless sensor …

[PDF][PDF] Providing Privacy and security of Wireless sensor network using ACTOR nodes

S Sharma, K Ghosh - Control Theory and Informatics, 2014 - academia.edu
ABSTRACT Wireless Sensor Networks (WSN) consists of large number sensor nodes.
Wireless sensor nodes are generally deployed in the far places like forests deserts and used …

[PDF][PDF] Cluster head influence based cooperative caching in wireless sensor networks

A Kumar - Advances in Information Science and Applications, 2014 - inase.org
Cooperative caching harnesses the combined data storage capacity of memory constrained
Sensor Nodes (SNs) for data caching. There are a number of Wireless Sensor Network …

A Reply Cache Mechanism to Reduce Query Latency of WSN in IoT Sensory Environment

YS Reddy, KK Pattanaik - 2016 IEEE International Symposium …, 2016 - ieeexplore.ieee.org
Query driven process execution in wireless sensor network (WSN) are of either idempotent
or non-idempotent in nature. Prior identification of idempotent queries on the basis of their …

[PDF][PDF] To Maintain the Privacy in Moveable Sink to Prevent Active and Passive Attacks

S Kumar, A Bajaj, A Kumar - anoopnagotra.github.io
Wireless Sensor Networks (WSN) consists of large number sensor nodes. Wireless sensor
nodes are generally deployed in the far places like forests deserts and used to sense the …

[PDF][PDF] Addressing and Solving the problem of Data Authenticity due to Packet Dropping by Selfish Nodes in WSN

S Sharma, MK Ghosh - core.ac.uk
ABSTRACT Wireless Sensor Networks (WSN) consists of large number sensor nodes.
Wireless sensor nodes are generally deployed in the far places like forests deserts and used …