A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

A systematic survey: Security threats to UAV-aided IoT applications, taxonomy, current challenges and requirements with future research directions

M Adil, MA Jan, Y Liu, H Abulkasim… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) as an intermediary can offer an efficient and useful
communication paradigm for different Internet of Things (IoT) applications. Following the …

Secure routing-based energy optimization for IOT application with heterogeneous wireless sensor networks

R Nagaraju, SB Goyal, C Verma, CO Safirescu… - Energies, 2022 - mdpi.com
Wireless sensor networks (WSNs) and the Internet of Things (IoT) are increasingly making
an impact in a wide range of domain-specific applications. In IoT-integrated WSNs, nodes …

Improved blowfish algorithm-based secure routing technique in IoT-based WSN

M Alotaibi - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) has gained popularity with the growth and prospects of smart
networks. It is intended to exploit the network edges, which enables smart service and …

Trust-based clustering and best route selection strategy for energy efficient wireless sensor networks

G Sudha, C Tharini - Automatika: časopis za automatiku, mjerenje …, 2023 - hrcak.srce.hr
Sažetak Energy efficiency is one of the most researchable topics of the energy constrained
Wireless Sensor Networks (WSN). Due to the widespread usage of WSN in real-time …

A temperature-aware trusted routing scheme for sensor networks: Security approach

T Khan, K Singh, M Manjul, MN Ahmad, AM Zain… - Computers & Electrical …, 2022 - Elsevier
This paper presents a hybrid trust model, and a multifactor, depending on trust value of
sensor nodes, remaining energy, and hop count, routing strategy known as Temperature …

The emerging of named data networking: Architecture, application, and technology

WMH Azamuddin, AHM Aman, H Sallehuddin… - IEEE …, 2023 - ieeexplore.ieee.org
Named Data Networking (NDN) is developed to accommodate future-oriented internet traffic.
In recent years, NDN's popularity has grown due to the evolution of the Internet of Things …

D2D multi-hop multi-path communications in B5G networks: A survey on models, techniques, and applications

QN Tran, NS Vo, QA Nguyen, MP Bui, TM Phan… - … on Industrial Networks …, 2021 - eudl.eu
In 5G networks, device-to-device (D2D) communications have played an important role in
enlarging the coverage, relaxing the workload of backhaul links of both macro base stations …

Intelligent route discovery towards rushing attacks in ad hoc wireless networks

U Allimuthu, K Mahalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
MANET (mobile ad-hoc networks) are distributed or delegated away from a central server,
authoritative location of wireless networks that communicate without pre-existing structure …

F-EVM: improving routing in Internet of Things using fuzzy MAIRCA approach and fuzzy eigenvector method

M Mohammadi, A Mehranzadeh, M Chekin - Cluster Computing, 2024 - Springer
Many devices are connected to each other using Internet of Things (IoT) technology today.
The capabilities of this technology have highlighted its importance, but significant …