A decentralized proxy-JRC authentication system for scalable IETF 6TiSCH networks
Many Industrial Internet of Things (IIoT) applications require wireless networks with low
power consumption, low latency, and secure communication. The IPv6 over the TSCH mode …
power consumption, low latency, and secure communication. The IPv6 over the TSCH mode …
Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing
Connecting smart industrial components to computer networks revolutionizes business
operations. However, in the Industrial Internet of Things (IIoT), the sharing of data has …
operations. However, in the Industrial Internet of Things (IIoT), the sharing of data has …
An Adaptive Security Framework for Internet of Things Networks Leveraging SDN and Machine Learning
A Hamarsheh - Applied Sciences, 2024 - mdpi.com
The Internet of Things (IoT) is expanding rapidly with billions of connected devices
worldwide, necessitating robust security solutions to protect these systems. This paper …
worldwide, necessitating robust security solutions to protect these systems. This paper …
Optimizing Energy Efficiency and Security in Wireless Sensor Networks with a Hybrid HF-ECC
B Tharani, BP Devi - 2024 10th International Conference on …, 2024 - ieeexplore.ieee.org
Numerous distinct categories of businesses take advantage of “Wireless Sensor Networks
(WSNs)”. Interfering with “Sensor Node (SN s)” and eavesdrop** on communications are …
(WSNs)”. Interfering with “Sensor Node (SN s)” and eavesdrop** on communications are …
CSIT Analysis of Key Management Schemes for Centralized and Distributed Key Revocation in Wireless Sensor Networks
Wireless sensor network (WSN) applications have been utilized for a variety of applications.
Such as monitoring environments, military functions, and patient status monitoring. A major …
Such as monitoring environments, military functions, and patient status monitoring. A major …
H∞ Filtering Method for WSNs with Privacy Protection under FDI Attack
J Liu, L Liu, Y Zhang - 2023 8th International Conference on …, 2023 - ieeexplore.ieee.org
For wireless sensor networks (WSNs) under false data injection (FDI) attacks, the study
focuses on the design problem of an elastic H∞ filter under privacy protection. In this paper …
focuses on the design problem of an elastic H∞ filter under privacy protection. In this paper …