A survey on intelligent Internet of Things: Applications, security, privacy, and future directions

O Aouedi, TH Vu, A Sacco, DC Nguyen… - … surveys & tutorials, 2024 - ieeexplore.ieee.org
The rapid advances in the Internet of Things (IoT) have promoted a revolution in
communication technology and offered various customer services. Artificial intelligence (AI) …

Improving source location privacy in social internet of things using a hybrid phantom routing technique

T Hussain, B Yang, HU Rahman, A Iqbal, F Ali - Computers & Security, 2022 - Elsevier
Abstract The amalgamation of Smart IoT and Machine learning is an emerging research
area. In this context, a new trend in IoT called Social IoT has been considered for this study …

Security of internet of things based on cryptographic algorithms: a survey

SK Mousavi, A Ghaffari, S Besharat, H Afshari - Wireless Networks, 2021 - Springer
Abstract Internet of Things (IoT) is a new concept in Information and Communications
Technology and its structure is based on smart objects communications. It contributes to …

An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system

SKSL Preeth, R Dhanalakshmi, R Kumar… - Journal of Ambient …, 2018 - Springer
Energy efficiency is a significant problem in wireless sensor networks. Sensor networks are
battery powered, therefore become a dead after certain period of time. In clustering …

A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges

SN Mahapatra, BK Singh, V Kumar - Arabian Journal for Science and …, 2020 - Springer
Internet of things (IoT) is one of the emerging paradigms in the current era that has attracted
many researchers due to its widespread applications. Due to the open nature of the device …

Effective features to classify big data using social internet of things

SK Lakshmanaprabu, K Shankar, A Khanna… - IEEE …, 2018 - ieeexplore.ieee.org
Social Internet of Things (SIoT) supports many novel applications and networking services
for the IoT in a more powerful and productive way. In this paper, we have introduced a …

SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism

M Zaminkar, R Fotohi - Wireless Personal Communications, 2020 - Springer
Abstract Through the Internet of Things (IoT) the internet scope is established by the
integration of physical things to classify themselves into mutual things. A physical thing can …

Efficient CNN based summarization of surveillance videos for resource-constrained devices

K Muhammad, T Hussain, SW Baik - Pattern Recognition Letters, 2020 - Elsevier
The widespread usage of surveillance cameras in smart cities has resulted in a gigantic
volume of video data whose indexing, retrieval and management is a challenging issue …

A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT

G Han, H Wang, X Miao, L Liu, J Jiang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Among several new technologies, such as social and cognitive mobile computing, wireless
sensor networks (WSNs) constitute the founding pillar of the industrial Internet of Things …

CPSLP: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks

G Han, X Miao, H Wang, M Guizani… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Source location privacy is a major problem in wireless sensor networks (WSNs). WSNs are
usually deployed in random areas with no protection. The source location reveals valuable …