Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm

RJ Anandhi - International Journal of Information Technology, 2024‏ - Springer
The rapid evolution of network traffic created various problems in detecting Distributed
Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) …

An energy efficient encryption technique for the Internet of Things sensor nodes

I Sultan, MT Banday - International Journal of Information Technology, 2024‏ - Springer
Securing data at the back end in Internet of Things (IoT) applications, such as a cloud server,
is easy due to the ample computational resources at that stage. However, securing the data …

Optimized quantum circuit implementation of SATURNIN for Grover's algorithm

SN Allu, TA Naidu, KG Rao - International Journal of Information …, 2024‏ - Springer
In 2019, SATURNIN a light-weighted block cipher was proposed for post-quantum security.
In this research, we try to examine the security strength of SATURNIN by implementing its …

Improving dependability with low power fault detection model for skinny-hash

S Arvind Barge, GI Mary - PloS one, 2024‏ - journals.plos.org
The increasing popularity and prevalence of Internet of Things (IoT) applications have led to
the widespread use of IoT devices. These devices gather information from their environment …

Evaluation of a 3-DOF helicopter dynamic control model using FOPID controller-based three optimization algorithms

N Basil, HM Marhoon, AF Mohammed - International Journal of Information …, 2024‏ - Springer
This paper discusses the performance comparison of three advanced AI methodologies,
namely: Harris Hawks Optimization (HHO), Hybrid Sperm Swarm Optimization Gravitational …

Novel hardware architectures of improved-LEA lightweight cipher for IoT applications

G Uttam, P Dwivedi, P Singh, B Acharya - International Journal of …, 2024‏ - Springer
Abstract The Internet of Things (IoTs), smart cards, and other ubiquitous computing devices
have grown exponentially since last decade. These devices demand new security and …

Audio verification in forensic investigation using light deep neural network

ND AL-Shakarchy, ZN Abdullah, ZM Alameen… - International Journal of …, 2024‏ - Springer
Recently people have difficulties distinguishing real speech from computer-generated
speech so that the synthetic voice is getting closer to a natural-sounding voice, due to the …

Quantum resource estimation of PRINCE and Midori Block Ciphers

AH Akhlaq, SN Allu, N Yerukala - International Journal of Information …, 2024‏ - Springer
With the continuous advancement of quantum technologies, the estimation of quantum
resources necessary for quantum tasks becomes extremely important for optimization …

ZeroMedChain: Layer 2 Security and Zero-knowledge Proof Integration for Decentralized Identity and Access Management in Healthcare

P Verma, V Tripathi, B Pant - 2024 11th International …, 2024‏ - ieeexplore.ieee.org
With the rise of healthcare digitization, it has become a critical priority to safeguard patient
privacy and ensure data security. Conventional methods of data access control mechanisms …