A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

A survey on trust models in heterogeneous networks

J Wang, Z Yan, H Wang, T Li… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Heterogeneous networks (HetNets) merge different types of networks into an integrated
network system, which has become a hot research area in recent years towards next …

A survey and future directions on clustering: From WSNs to IoT and modern networking paradigms

A Shahraki, A Taherkordi, Ø Haugen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Many Internet of Things (IoT) networks are created as an overlay over traditional ad-hoc
networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over …

A survey of Internet of Things (IoT) for geohazard prevention: Applications, technologies, and challenges

G Mei, N Xu, J Qin, B Wang, P Qi - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Geologic hazards (geohazards) are naturally occurring or human-activity-induced geologic
conditions capable of causing damage or loss of property and/or life. geohazards, such as …

A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography

D Sadhukhan, S Ray, GP Biswas, MK Khan… - The Journal of …, 2021 - Springer
Internet of things (IoT) has become a new era of communication technology for performing
information exchange. With the immense increment of usage of smart devices, IoT services …

Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …

[HTML][HTML] Enabling secure data transmission for wireless sensor networks based IoT applications

U Panahi, C Bayılmış - Ain Shams Engineering Journal, 2023 - Elsevier
The high volume of sensed and transferred data among nodes on wireless sensor networks
makes it necessary to keep the data safe. This study offers an improved security mechanism …

A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks

E Yousefpoor, H Barati, A Barati - Peer-to-Peer Networking and …, 2021 - Springer
A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered
in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the …

Internet-of-Things and information fusion: Trust perspective survey

F Azzedin, M Ghaleb - Sensors, 2019 - mdpi.com
The advent of Internet-of-Things (IoT) is creating an ecosystem of smart applications and
services enabled by a multitude of sensors. The real value of these IoT smart applications …

DEICA: A differential evolution‐based improved clustering algorithm for IoT‐based heterogeneous wireless sensor networks

SK Chaurasiya, A Biswas, A Nayyar… - International Journal …, 2023 - Wiley Online Library
With the evolution of technology, many modern applications like habitat monitoring,
environmental monitoring, disaster prediction and management, and telehealth care have …