Search Results - (( based applications security algorithm ) OR ( _ application sensor algorithm ))*
Search alternatives:
- based applications »
- application sensor »
- sensor algorithm »
-
1
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
5
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
Get full text
Get full text
Get full text
Thesis -
6
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
Published 2015“…By merging wireless sensor nodes with mobile robots, the performance of wireless sensor network applications may be improved. …”
Get full text
Get full text
Thesis -
7
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
Adaptive data collection algorithm for wireless sensor networks
Published 2008Get full text
Get full text
Article -
10
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…The multi-criterion energyefficient routing mechanism uses the ACO algorithm, inspired by ants' foraging behaviour. In Bluetooth M-LPNWSN systems, virtual ants explore paths based on signal robustness, distances, and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
11
Enhancing Smart Home Security System with HOG algorithm
Published 2025“…The objectives of this study revolve around the integration of various components, including smart locks employing solenoid locking mechanisms, ultrasonic sensors, video surveillance, and mobile application-based access control. …”
Get full text
Get full text
Get full text
Article -
12
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
Volunteer-instigated Connectivity Restoration algorithm for Wireless Sensor and Actor Networks
Published 2010“…Due to their applications, Wireless Sensor and Actor Networks (WSANs) have recently been getting significant attention from the research community. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
16
Feasibility of PKC in resource-constrained wireless sensor networks
Published 2008“…By this time, several works have proved that the lightweight versions of many well-known public key algorithms can be utilized in WSN environment. With the expense of a little energy, public key based schemes could in fact be the best choice for ensuring data security in high-security demanding WSN applications. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Internet of things security vulnerabilities and recommended solutions
Published 2018“…The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. …”
Get full text
Get full text
Get full text
Article -
18
A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement
Published 2016“…As the need of this application increases, several security issues also arise due to the nature of open wireless medium. …”
Get full text
Get full text
Get full text
Article -
19
A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement
Published 2016“…As the need of this application increases, several security issues also arise due to the nature of open wireless medium. …”
Get full text
Get full text
Get full text
Article -
20
Public key cryptography in resource-constrained WSN
Published 2008“…By this time, several works have proved that the lightweight versions of many well-known public key algorithms can be utilized in WSN environment. With the expense of a little energy, public key based schemes could in fact be the best choice for ensuring data security in high-security demanding WSN applications. …”
Get full text
Get full text
Monograph
