An energy efficient encryption technique for the Internet of Things sensor nodes

I Sultan, MT Banday - International Journal of Information Technology, 2024 - Springer
Securing data at the back end in Internet of Things (IoT) applications, such as a cloud server,
is easy due to the ample computational resources at that stage. However, securing the data …

Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm

RJ Anandhi - International Journal of Information Technology, 2024 - Springer
The rapid evolution of network traffic created various problems in detecting Distributed
Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) …

Evaluation of a 3-DOF helicopter dynamic control model using FOPID controller-based three optimization algorithms

N Basil, HM Marhoon, AF Mohammed - International Journal of Information …, 2024 - Springer
This paper discusses the performance comparison of three advanced AI methodologies,
namely: Harris Hawks Optimization (HHO), Hybrid Sperm Swarm Optimization Gravitational …

Audio verification in forensic investigation using light deep neural network

ND AL-Shakarchy, ZN Abdullah, ZM Alameen… - International Journal of …, 2024 - Springer
Recently people have difficulties distinguishing real speech from computer-generated
speech so that the synthetic voice is getting closer to a natural-sounding voice, due to the …

ZeroMedChain: Layer 2 security and zero-knowledge proof integration for decentralized identity and access management in healthcare

P Verma, V Tripathi, B Pant - 2024 11th international …, 2024 - ieeexplore.ieee.org
With the rise of healthcare digitization, it has become a critical priority to safeguard patient
privacy and ensure data security. Conventional methods of data access control mechanisms …

Improving dependability with low power fault detection model for skinny-hash

S Arvind Barge, GI Mary - PloS one, 2024 - journals.plos.org
The increasing popularity and prevalence of Internet of Things (IoT) applications have led to
the widespread use of IoT devices. These devices gather information from their environment …

Optimized quantum circuit implementation of SATURNIN for Grover's algorithm

SN Allu, TA Naidu, KG Rao - International Journal of Information …, 2024 - Springer
In 2019, SATURNIN a light-weighted block cipher was proposed for post-quantum security.
In this research, we try to examine the security strength of SATURNIN by implementing its …

Evaluation of optimization algorithms for power and voltage in solar power generation system: FOPID controller and MPPT-based P&O algorithm

ZA Dawood, SN Tackie, K Dimililer - International Journal of Information …, 2025 - Springer
In this work, the study gives attention for improvement of the Maximum Power Point Tracking
(MPPT) using the Perturb and Observe (P&O) algorithm based MPPT applied to solar power …

Novel hardware architectures of improved-LEA lightweight cipher for IoT applications

G Uttam, P Dwivedi, P Singh, B Acharya - International Journal of …, 2024 - Springer
Abstract The Internet of Things (IoTs), smart cards, and other ubiquitous computing devices
have grown exponentially since last decade. These devices demand new security and …

Quantum resource estimation of PRINCE and Midori Block Ciphers

AH Akhlaq, SN Allu, N Yerukala - International Journal of Information …, 2024 - Springer
With the continuous advancement of quantum technologies, the estimation of quantum
resources necessary for quantum tasks becomes extremely important for optimization …