A novel trust-based security and privacy model for internet of vehicles using encryption and steganography

MS Rathore, M Poongodi, P Saurabh… - Computers and …, 2022 - Elsevier
High-speed wireless network technologies play a vital role in autonomous vehicle
communication systems (AVS), ie, IoV (Internet of Vehicles), and enhance the effectiveness …

An enhanced intrusion detection model based on improved kNN in WSNs

G Liu, H Zhao, F Fan, G Liu, Q Xu, S Nazir - Sensors, 2022 - mdpi.com
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering
the combined characteristics of the wireless sensor network, we consider setting up a …

Improved authenticated key agreement scheme for fog‐driven IoT healthcare system

TY Wu, T Wang, YQ Lee, W Zheng… - Security and …, 2021 - Wiley Online Library
The Internet of things (IoT) has been widely used for various applications including medical
and transportation systems, among others. Smart medical systems have become the most …

Simplified Phasmatodea population evolution algorithm for optimization

PC Song, SC Chu, JS Pan, H Yang - Complex & Intelligent Systems, 2022 - Springer
This work proposes a population evolution algorithm to deal with optimization problems
based on the evolution characteristics of the Phasmatodea (stick insect) population, called …

Toward a secure smart-home IoT access control scheme based on home registration approach

TY Wu, Q Meng, YC Chen, S Kumari, CM Chen - Mathematics, 2023 - mdpi.com
The extensive application of the Internet of Things (IoT) and artificial intelligence technology
has greatly promoted the construction and development of smart cities. Smart home as the …

Rotating behind security: A lightweight authentication protocol based on iot-enabled cloud computing environments

TY Wu, Q Meng, S Kumari, P Zhang - Sensors, 2022 - mdpi.com
With the rapid development of technology based on the Internet of Things (IoT), numerous
IoT devices are being used on a daily basis. The rise in cloud computing plays a crucial role …

Cellulose nanocrystal chiral photonic micro-flakes for multilevel anti-counterfeiting and identification

T Chang, B Wang, D Yuan, Y Wang, I Smalyukh… - Chemical Engineering …, 2022 - Elsevier
Counterfeiting and forgery have caused enormous economic loss and many safety
concerns, and many approaches have been employed for anti-counterfeiting. However …

A parallel compact gannet optimization algorithm for solving engineering optimization problems

JS Pan, B Sun, SC Chu, M Zhu, CS Shieh - Mathematics, 2023 - mdpi.com
The Gannet Optimization Algorithm (GOA) has good performance, but there is still room for
improvement in memory consumption and convergence. In this paper, an improved Gannet …

Embellishment of upconversion nanoparticles with ultrasmall perovskite quantum dots for full‐color tunable, dual‐modal luminescence anticounterfeiting

K Du, M Zhang, Y Li, H Li, K Liu, C Li… - Advanced Optical …, 2021 - Wiley Online Library
Advanced fluorescent anticounterfeiting technology has attracted widespread attention and
encourages people to develop reliable luminescent materials with multiple colors and …

A provably secure authentication and key exchange protocol in vehicular ad hoc networks

TY Wu, Z Lee, L Yang, CM Chen - Security and Communication …, 2021 - Wiley Online Library
While cloud computing and Internet of Things (IoT) technologies have gradually matured,
mobile intelligent transportation systems have begun to be widely used. In particular, the …