Trustworthy Localization in IoT Networks: A Survey of Localization Techniques, Threats, and Mitigation

G Pettorru, V Pilloni, M Martalò - Sensors, 2024 - mdpi.com
The Internet of Things (IoT) has revolutionized the world, connecting billions of devices that
offer assistance in various aspects of users' daily lives. Context-aware IoT applications …

A survey on advancements in blockchain-enabled spectrum access security for 6G cognitive radio IoT networks

NY Al-Matari, AT Zahary, A A. Al-Shargabi - Scientific Reports, 2024 - nature.com
The emergence of 6G cognitive radio IoT networks introduces both opportunities and
complexities in spectrum access and security. Blockchain technology has emerged as a …

RETRACTED ARTICLE: Dynamic pseudonyms trust-based model to protect attack scenario for internet of vehicle ad-hoc networks

I Memon, RA Shaikh, H Shaikh - Multimedia Tools and Applications, 2024 - Springer
The Intelligent transport systems (ITS) have evolved with the Internet of Vehicles (IoV) and
the growth of advanced wireless technology associated with billions of smart devices …

Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network

E Abdelkreem, S Hussein, A Tammam - International Journal of …, 2024 - Springer
The vehicular ad-hoc network is a technology that enables vehicles to interact with each
other and the surrounding infrastructure, aiming to enhance road safety and driver comfort …

Security enhancement of the cloud paradigm using a novel optimized crypto mechanism

KK Singh, VK Jha - Multimedia Tools and Applications, 2023 - Springer
Nowadays, medical enterprises are gradually attracted to store their data in the cloud
paradigm and distribute the data between the authorized person due to the enormous …

A dynamic and optimized routing approach for VANET communication in smart cities to secure intelligent transportation system via a chaotic multi-verse optimization …

Sumit, RS Chhillar, S Dalal, S Dalal, UK Lilhore… - Cluster …, 2024 - Springer
VANET technology is an essential component of Intelligent Transportation Systems, which
makes c communication between moving cars and stationary Road Side Units more …

A survey on authentication protocols of dynamic wireless EV charging

N Hettiarachchi, S Hakak, K Mandal - Computer Communications, 2024 - Elsevier
Abstract Electric Vehicles (EVs) are considered the predominant method of decreasing fossil
fuels as well as greenhouse gas emissions. With the drastic growth of EVs, the future smart …

Privacy‐preserving enhanced dummy‐generation technique for location‐based services

D Parmar, UP Rao - Concurrency and Computation: Practice …, 2023 - Wiley Online Library
Location‐based services (LBS) has become an intrinsic part of our everyday life. However,
the flexibility and convenience provided by LBS are at the cost of user privacy since …

LBS user location privacy protection scheme based on trajectory similarity

K Qian, X Li - Scientific Reports, 2022 - nature.com
During the data set input or output, or the data set itself adds noise to enable data distortion
to effectively reduce the risk of user privacy leakage. However, in the conventional method …

Secure Protocols in VANETs: Availability Considerations

MS Manaseer, MB Younes - 2023 14th International …, 2023 - ieeexplore.ieee.org
The vehicular network technology provides several intelligent applications over road
networks. These applications are classified into safety, efficiency, and infotainment based on …