BFIM: Performance measurement of a blockchain based hierarchical tree layered fog-IoT microservice architecture

M Whaiduzzaman, MJN Mahi, A Barros, MI Khalil… - IEEE …, 2021 - ieeexplore.ieee.org
Fog computing complements cloud computing by removing several limitations, such as
delays and network bandwidth. It emerged to support Internet of Things (IoT) applications …

An active-routing authentication scheme in MANET

J Tu, D Tian, Y Wang - IEEE Access, 2021 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANET) is a network mode that does not depend on network
infrastructure and central access. The fast and flexible networking mode of MANET renders …

An identity-based encryption scheme for data security in fog computing

N Farjana, S Roy, MJN Mahi… - … of International Joint …, 2020 - Springer
Fog computing provides better integration facilities between cloud computing and Internet of
things with real-time interactions. It delivers faster computing functionalities sitting close to …

[PDF][PDF] A survey on security challenges in the current MANET routing protocols

FC Korir, W Cheruiyot - Global Journal of Engineering and …, 2022 - academia.edu
Wireless communication employs radio technology to facilitate data transmission without
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …

Buvots: A blockchain based unmanipulated voting scheme

M Biswas, MJN Mahi, R Hossen… - Proceedings of the …, 2020 - papers.ssrn.com
The electronic voting system is introduced in most countries to prevent vote tampering. The
infrastructure of the current voting system is not transparent and it can easily be manipulated …

AUASF: An anonymous users authentication scheme for fog-IoT environment

M Whaiduzzaman, K Oliullah… - 2020 11th …, 2020 - ieeexplore.ieee.org
Authentication is a challenging and emerging issue for Fog-IoT security paradigms. The fog
nodes toward large-scale end-users offer various interacted IoT services. The authentication …

Secured e-payment system based on automated authentication data and iterated salted hash algorithm

A Al Farawn, HD Rjeib, NS Ali… - … Electronics and Control …, 2020 - telkomnika.uad.ac.id
Electronic payment has been considered as one of the most significant and convenient
applications of modern electronic services e-University compared to traditional methods that …

HIBAF: A data security scheme for fog computing

M Whaiduzzaman, N Farjana, A Barros… - Journal of High …, 2021 - content.iospress.com
Fog computing complemented cloud computing integration services in the Internet of Things
(IoT) and the web of real-time interactivity. Fog offers faster computing and other services …

Understanding optimizations and measuring performances of PBKDF2

AF Iuorio, A Visconti - 2nd International Conference on Wireless Intelligent …, 2019 - Springer
Password-based key derivation functions (KDFs) are used to generate secure keys of
arbitrary length implemented in many security-related systems. The strength of these KDFs …

Implementation of security features in MANETs using SHA-3 standard algorithm

R Dilli, PCS Reddy - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
In Secure Hash Algorithm-3 standards, the functions are based on instance of the KECCAK
algorithm. In this paper, we have implemented Secured Hash Algorithm (SHA3-256) for …