Search Results - (( iot applications security algorithm ) OR ( based application during algorithm ))*
Search alternatives:
- application during »
- based application »
- iot applications »
- during algorithm »
-
1
-
2
-
3
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…These features resulted in faster runtime compared to the more established RS A asymmetric encryption scheme, making AAp a potential alternative for IoT security. At the time of writing this thesis, AAḃ algorithm still exists as a mathematical concept and proven in a mathematical based software. …”
Get full text
Get full text
Thesis -
4
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…Unmanned aerial vehicles (UAV) have enormous potential in enabling new applications in various areas, ranging from communication, military, security, to traffic-monitoring applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. …”
Get full text
Get full text
Get full text
Article -
10
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023“…Soft computing; Internet of Things (IOT); QR tag; Security Architecture; Security factors; Security objectives; Smart access; Smart city applications; Verification algorithms; Internet of things…”
Conference Paper -
12
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
13
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
14
-
15
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
16
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…Node authentication is a crucial part of IoT security. Owing to the centralized nature of IoT networks, the current internet security solutions are deemed to be insufficient to meet their security requirements and might even generate more potential points of failure. …”
Get full text
Get full text
Thesis -
17
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of the domain and the increasing complexity of security threats. …”
Review -
18
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…The proposed scheme uses the AES-ECC algorithm to provide secure communication and efficient key management. …”
Get full text
Get full text
Article -
19
Hyperledger Fabric Framework with 5G Network for Blockchain-based Security of IoT Smart Home Applications
Published 2021Get full text
Get full text
Conference or Workshop Item -
20
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…IoT networks need decentralized management for network security. …”
Get full text
Get full text
Article
