Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Internet of things security: challenges and key issues
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …
various objects and intelligent devices. The three important components of IoT are sensing …
SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication
Unmanned Aerial Vehicles (UAVs) are becoming very popular nowadays due to the
emergence of application areas such as the Internet of Drones (IoD). They are finding wide …
emergence of application areas such as the Internet of Drones (IoD). They are finding wide …
A reliable network intrusion detection approach using decision tree with enhanced data quality
Due to the recent advancements in the Internet of things (IoT) and cloud computing
technologies and growing number of devices connected to the Internet, the security and …
technologies and growing number of devices connected to the Internet, the security and …
Joint wireless power transfer and task offloading in mobile edge computing: a survey
The promising technique of Wireless Power Transfer (WPT) to end devices and sensors has
gained the attention of researchers recently. Mobile edge computing (MEC) is also …
gained the attention of researchers recently. Mobile edge computing (MEC) is also …
Reinforcement learning for intelligent online computation offloading in wireless powered edge networks
The method of charging mobile devices with wireless power transfer (WPT) from the base
station (BS) integrated with mobile edge computing (MEC) increases the potential of MEC …
station (BS) integrated with mobile edge computing (MEC) increases the potential of MEC …
Designing secure and lightweight user access to drone for smart city surveillance
Abstract The Internet of drones (IoD) is a very useful application of the Internet of things (IoT)
and it can help the daily life comfort through various functions including the smart city …
and it can help the daily life comfort through various functions including the smart city …
A secure and lightweight drones-access protocol for smart city surveillance
The rising popularity of ICT and the Internet has enabled Unmanned Aerial Vehicle (UAV) to
offer advantageous assistance to Vehicular Ad-hoc Network (VANET), realizing a relay …
offer advantageous assistance to Vehicular Ad-hoc Network (VANET), realizing a relay …
ALAM: Anonymous lightweight authentication mechanism for SDN-enabled smart homes
The smart connected devices are the first choice of cybercriminals for spreading spy wares
and different security attacks. The current security standards and protocols for Internet of …
and different security attacks. The current security standards and protocols for Internet of …
Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the
underlying open architecture for communication between the RFID devices may lead to …
underlying open architecture for communication between the RFID devices may lead to …
Identity and aggregate signature-based authentication protocol for IoD deployment military drone
With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor
system, drone technology has fascinated researchers in the field of network security. It is of …
system, drone technology has fascinated researchers in the field of network security. It is of …