Networking architectures and protocols for IoT applications in smart cities: Recent developments and perspectives

D Kanellopoulos, VK Sharma, T Panagiotakopoulos… - Electronics, 2023 - mdpi.com
Numerous municipalities employ the smart city model in large cities to improve the quality of
life of their residents, utilize local resources efficiently, and save operating expenses. This …

Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey

Shruti, S Rani, DK Sah, G Gianini - Sensors, 2023 - mdpi.com
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—
fog computing—are the most in-demand services at the present time. Cloud and fog …

Blockchain-based authentication and explainable AI for securing consumer IoT applications

R Kumar, D Javeed, A Aljuhani, A Jolfaei… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The consumer Internet of Things (IoT) applications in particular smart cities are mostly
equipped with Internet-connected networked devices to improve city operations by giving …

A blockchain-enabled security framework for smart agriculture

K Chatterjee, A Singh - Computers and Electrical Engineering, 2023 - Elsevier
Food consumers are more concerned about transparency, accountability, contamination
risks, food safety, and food quality. Thus, an overwhelming demand of a traceability solution …

Efficient data transmission on wireless communication through a privacy-enhanced blockchain process

R Aluvalu, SK VN, M Thirumalaisamy, S Basheer… - PeerJ Computer …, 2023 - peerj.com
In the medical era, wearables often manage and find the specific data points to check
important data like resting heart rate, ECG voltage, SPO2, sleep patterns like length …

Threat analysis model to control IoT network routing attacks through deep learning approach

K Janani, S Ramamoorthy - Connection Science, 2022 - Taylor & Francis
Most of the recent research has focused on the Internet of Things (IoT) and its applications.
The open interface and network connectivity of the interconnected systems under the IoT …

[PDF][PDF] Intelligent Intrusion Detection System for the Internet of Medical Things Based on Data-Driven Techniques.

O Taouali, S Bacha, K Ben Abdellafou… - … Systems Science & …, 2023 - cdn.techscience.cn
Introducing IoT devices to healthcare fields has made it possible to remotely monitor
patients' information and provide a proper diagnosis as needed, resulting in the Internet of …

ChainAgile: A framework for the improvement of Scrum Agile distributed software development based on blockchain

JN Qureshi, MS Farooq - Plos one, 2024 - journals.plos.org
Software Development based on Scrum Agile in a distributed development environment
plays a pivotal role in the contemporary software industry by facilitating software …

IDS-Chain: a collaborative intrusion detection framework empowered blockchain for internet of medical things

A Aljuhani - 2022 IEEE Cloud Summit, 2022 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) has been integrated and deployed in the health care
domain as it significantly facilitates medical services for both health care providers and …

Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm

R Agrawal, S Singhal, A Sharma - Cluster Computing, 2024 - Springer
Blockchain technology ensures the integrity and transparency of data access control by
keeping an unchangeable record of all transactions. Fog computing increases efficiency by …