A decentralized proxy-JRC authentication system for scalable IETF 6TiSCH networks

H Aydin, S Gormus, B Aydin - IEEE Access, 2024 - ieeexplore.ieee.org
Many Industrial Internet of Things (IIoT) applications require wireless networks with low
power consumption, low latency, and secure communication. The IPv6 over the TSCH mode …

Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing

MN Sohail, A Anjum, IA Saeed, MH Syed… - IEEE …, 2024 - ieeexplore.ieee.org
Connecting smart industrial components to computer networks revolutionizes business
operations. However, in the Industrial Internet of Things (IIoT), the sharing of data has …

An Adaptive Security Framework for Internet of Things Networks Leveraging SDN and Machine Learning

A Hamarsheh - Applied Sciences, 2024 - mdpi.com
The Internet of Things (IoT) is expanding rapidly with billions of connected devices
worldwide, necessitating robust security solutions to protect these systems. This paper …

Optimizing Energy Efficiency and Security in Wireless Sensor Networks with a Hybrid HF-ECC

B Tharani, BP Devi - 2024 10th International Conference on …, 2024 - ieeexplore.ieee.org
Numerous distinct categories of businesses take advantage of “Wireless Sensor Networks
(WSNs)”. Interfering with “Sensor Node (SN s)” and eavesdrop** on communications are …

CSIT Analysis of Key Management Schemes for Centralized and Distributed Key Revocation in Wireless Sensor Networks

T Yusuf, VO Waziri, M Olalere… - Gadau Journal of Pure …, 2024 - gadaufos.com
Wireless sensor network (WSN) applications have been utilized for a variety of applications.
Such as monitoring environments, military functions, and patient status monitoring. A major …

H Filtering Method for WSNs with Privacy Protection under FDI Attack

J Liu, L Liu, Y Zhang - 2023 8th International Conference on …, 2023 - ieeexplore.ieee.org
For wireless sensor networks (WSNs) under false data injection (FDI) attacks, the study
focuses on the design problem of an elastic H∞ filter under privacy protection. In this paper …