Session Key Agreement Protocol for Secure D2D Communication

VO Nyangaresi, Z Mohammad - … Conference on Safety and Security with …, 2022 - Springer
Device to device (D2D) communication offers numerous benefits such as low latencies, high
throughputs, spectral efficiency boosting, and base station energy reduction. However, lack …

[HTML][HTML] Hierarchical blockchain structure for node authentication in IoT networks

MT Al Ahmed, F Hashim, SJ Hashim… - Egyptian Informatics …, 2022 - Elsevier
Abstract Internet of Things (IoT) networks are large peer-to-peer networks of small devices
that require a competent security system that is scalable and adaptable to the limited …

A secure and intelligent framework for vehicle health monitoring exploiting big-data analytics

MA Rahman, MA Rahim, MM Rahman… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The dependency on vehicles is increasing tremendously due to its excellent transport
capacity, fast, efficient, flexible, pleasant journey, minimal physical effort, and substantial …

CRLM: A cooperative model based on reinforcement learning and metaheuristic algorithms of routing protocols in wireless sensor networks

Z Wang, L Shao, S Yang, J Wang, D Li - Computer Networks, 2023 - Elsevier
In wireless sensor networks, reasonable clustering and routing are keys to efficient energy
utilization. However, the selection of cluster heads and routes is NP-hard. Most of the …

[PDF][PDF] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN.

S Nashwan - Computers, Materials & Continua, 2021 - researchgate.net
The healthcare internet of things (IoT) system has dramatically reshaped this important
industry sector. This system employs the latest technology of IoT and wireless medical …

Secret dynamic key authentication and decision trust secure routing framework for internet of things based WSN

U Meena, P Sharma - Wireless Personal Communications, 2022 - Springer
Abstract Internet of Things (IoT) devices has risen drastically due to the advancement of
Information and communication technologies. Wireless sensor network (WSN) performs a …

[HTML][HTML] Lightweight key distribution for secured and energy efficient communication in wireless sensor network: An optimization assisted model

DS Misbha - High-Confidence Computing, 2023 - Elsevier
Due to their open, expansive, and resource-constrained character, Wireless Sensor
Networks (WSNs) face significant energy, efficiency, and security issues. With a fair level of …

An anonymous authentication and key agreement protocol in smart living

F Li, X Yu, Y Cui, S Yu, Y Sun, Y Wang… - Computer Communications, 2022 - Elsevier
Abstract Wireless Sensor Networks (WSNs) play an indispensable role in the application of
smart homes, smart healthcare, and precision agriculture. However, WSNs confront privacy …

Blockchain-based lightweight authentication mechanisms for industrial internet of things and information systems

M Zhao, C Shi, Y Yuan - International Journal on Semantic Web and …, 2024 - igi-global.com
The industrial internet of things (IIoT) necessitates robust cross-domain authentication to
secure sensitive on-site equipment data. This paper presents a refined reputation-based …

Application of RFID internet of things for school empowerment towards smart school

Y Efendi, S Imardi, R Muzawi… - Jurnal Pengabdian dan …, 2021 - jppmi.ptti.web.id
Abstract State Vocational High School (SMK) 1 Perhentian Raja is a school located in
Hangtuah village which is known as a catfish-producing village in Kampar Riau Regency …