Firewall best practices for securing smart healthcare environment: A review

RW Anwar, T Abdullah, F Pastore - Applied Sciences, 2021 - mdpi.com
Smart healthcare environments are growing at a rapid pace due to the services and benefits
offered to healthcare practitioners and to patients. At the same time, smart healthcare …

IoT trust and reputation: a survey and taxonomy

M Aaqib, A Ali, L Chen, O Nibouche - Journal of Cloud Computing, 2023 - Springer
IoT is one of the fastest-growing technologies and it is estimated that more than a billion
devices would be utilised across the globe by the end of 2030. To maximise the capability of …

Improved deep convolutional neural network based malicious node detection and energy-efficient data transmission in wireless sensor networks

M Kumar, P Mukherjee, K Verma… - … on Network Science …, 2021 - ieeexplore.ieee.org
Wireless Sensors Networks (WSN) is the self-configured Wireless Ad hoc Networks
(WANET) for Internet of Things (IoT) which consists of a huge measure of resource …

ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs

T Khan, K Singh, MH Hasan, K Ahmad… - Future Generation …, 2021 - Elsevier
Trust-based secure routing schemes are more effective than cryptographic routing protocols
to convey energy-efficient data in WSNs since cryptographic protocols require high …

Edge-computing-based trustworthy data collection model in the internet of things

T Wang, L Qiu, AK Sangaiah, A Liu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
It is generally accepted that the edge computing paradigm is regarded as capable of
satisfying the resource requirements for the emerging mobile applications such as the …

Energy-aware and trust-based secure routing protocol for wireless sensor networks using adaptive genetic algorithm

Y Han, H Hu, Y Guo - IEEE Access, 2022 - ieeexplore.ieee.org
Due to their working environments, limited resources and communication characteristics,
wireless sensor networks face some challenges including energy optimization and security …

Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN

K Thangaramya, K Kulothungan, S Indira Gandhi… - Soft Computing, 2020 - Springer
In wireless sensor networks (WSNs), energy optimization and the provision of security are
the major design challenges. Since the wireless sensor devices are energy constrained, the …

Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network

R Bhan, R Pamula, P Faruki, J Gajrani - The Journal of Supercomputing, 2023 - Springer
Abstract The Internet of Medical Things (IoMT) is an extended genre of the Internet of Things
(IoT) where the Things collaborate to provide remote patient health monitoring, also known …

A malicious node detection strategy based on fuzzy trust model and the ABC algorithm in wireless sensor network

B Pang, Z Teng, H Sun, C Du, M Li… - IEEE wireless …, 2021 - ieeexplore.ieee.org
Wireless sensor network (WSN) nodes owing to their openness, are susceptible to several
threats, one of which is dishonest recommendation attacks providing false trust values that …

A secure and dependable trust assessment (SDTS) scheme for industrial communication networks

T Khan, K Singh, K Ahmad, KAB Ahmad - Scientific Reports, 2023 - nature.com
Due to tamper-resistant sensor nodes and wireless media, Industrial Wireless Sensor
Networks (WSNs) are susceptible to various security threats that severely affect …