Search Results - (( _ application based algorithm ) OR ( iot applications security algorithm ))
Search alternatives:
- application based »
- iot applications »
-
1
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
Get full text
Get full text
Get full text
Article -
5
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023“…Soft computing; Internet of Things (IOT); QR tag; Security Architecture; Security factors; Security objectives; Smart access; Smart city applications; Verification algorithms; Internet of things…”
Conference Paper -
6
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis -
7
-
8
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…The proposed scheme uses the AES-ECC algorithm to provide secure communication and efficient key management. …”
Get full text
Get full text
Article -
9
-
10
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…Using less power, the proposed architecture is implemented based on python programming language, thereby improving time and power requirements compared to the traditional algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
12
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
Hyperledger Fabric Framework with 5G Network for Blockchain-based Security of IoT Smart Home Applications
Published 2021Get full text
Get full text
Conference or Workshop Item -
15
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
Get full text
Get full text
Article -
16
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…To encrypt the elliptical curve cryptographic (ECC) and to generate keys, the Chinese remainder theorem (CRT)-based scheme is proposed and compared with the secure hash algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Internet of things security vulnerabilities and recommended solutions
Published 2018“…This paper focusses on the security issues posed by large-scale heterogeneous IoT paradigm and arriving at a secure architectural framework adoptable by a variety of applications that include smart transportation, smart cities, smart healthcare, etc. based on IoT.…”
Get full text
Get full text
Get full text
Article -
19
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
20
