Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure and lightweight user authentication scheme for cloud-assisted internet of things
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey
S Szymoniak - ACM Computing Surveys, 2024 - dl.acm.org
We use sensor technologies in many areas of everyday life. We use sensors to check and
study various phenomena and to improve our lives. Hence, the sensors are used in …
study various phenomena and to improve our lives. Hence, the sensors are used in …
[HTML][HTML] Maximizing energy efficiency in wireless sensor networks for data transmission: A Deep Learning-Based Grou** Model approach
Abstract Wireless Sensor Networks (WSNs) are widely studied for their data collection and
monitoring capabilities across diverse applications. However, the limited energy resources …
monitoring capabilities across diverse applications. However, the limited energy resources …
Designing secure PUF-based authentication protocols for constrained environments
Abstract Physical Unclonable Functions (PUFs) are widely used in cryptographic
authentication and key-agreement protocols due to their unique physical properties. This …
authentication and key-agreement protocols due to their unique physical properties. This …
Post-quantum secure authenticated key agreement protocol for wireless sensor networks
M Singh, D Mishra - Telecommunication Systems, 2023 - Springer
In today's digital world, our communication medium has become wireless. The addition of
many sensor devices in wireless connection forms a wireless sensor network (WSN). To …
many sensor devices in wireless connection forms a wireless sensor network (WSN). To …
SF‐LAP: Secure M2M Communication in IIoT with a Single‐Factor Lightweight Authentication Protocol
Machine‐to‐machine communication allows smart devices like sensors, actuators, networks,
gateways, and other controllers to communicate with one another. The industrial Internet of …
gateways, and other controllers to communicate with one another. The industrial Internet of …
A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSN
Abstract Wireless Medical Sensor Network (WMSN) is a kind of Ad-hoc Network that is used
in the health sector to continuously monitor patients' health conditions and provide instant …
in the health sector to continuously monitor patients' health conditions and provide instant …
Malicious replica quarantining protocol for Mobile Wireless Sensor Networks using replica detection and identification
EA Alrashed, MH Karaata, AA Hamdan - Internet of Things, 2024 - Elsevier
Since sensor networks are deployed in harsh and unattended environments, and the nodes
are not tamper-resistant, security is crucial for all the impending sensor network applications …
are not tamper-resistant, security is crucial for all the impending sensor network applications …
Evolutionary game and LGPSO for attack-defense confrontation analysis in WSN from macro perspective
Wireless sensor network node security requires effective security mechanisms to protect the
security and reliability, so as to ensure that sensor nodes can operate normally and provide …
security and reliability, so as to ensure that sensor nodes can operate normally and provide …
Practical and Secure Password Authentication and Key Agreement Scheme Based Dual-Server for IoT Devices in 5G Network
S Zhang, Y Liu, T Gao, Y **e… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
As the proliferation of 5th Generation Mobile Communication Technology (5G) accelerates
the adoption of Internet of Things (IoT) applications, building robust and secure …
the adoption of Internet of Things (IoT) applications, building robust and secure …