Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
A novel secure IoT-based smart home automation system using a wireless sensor network
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches
for several applications, including smart homes, healthcare, environmental monitoring, and …
for several applications, including smart homes, healthcare, environmental monitoring, and …
Secure authentication and load balancing of distributed edge datacenters
Edge computing is an emerging research area to incorporate cloud computing into edge
network devices. An Edge datacenter, also referred to as EDC, processes data streams and …
network devices. An Edge datacenter, also referred to as EDC, processes data streams and …
Robust decentralised trust management for the internet of things by using game theory
Due to the large scale of the typical deployments and the involvement of moving objects to
the Internet of Things, participating nodes opportunistically establish data exchanging …
the Internet of Things, participating nodes opportunistically establish data exchanging …
EDTD-SC: An IoT sensor deployment strategy for smart cities
A smart city is a geographical area that uses modern technologies to facilitate the lives of its
residents. Wireless sensor networks (WSNs) are important components of smart cities …
residents. Wireless sensor networks (WSNs) are important components of smart cities …
P2DCA: a privacy-preserving-based data collection and analysis framework for IoMT applications
The concept of Internet of Multimedia Things (IoMT) is becoming popular nowadays and can
be used in various smart city applications, eg, traffic management, healthcare, and …
be used in various smart city applications, eg, traffic management, healthcare, and …
Mobility enabled security for optimizing IoT based intelligent applications
The critical challenges for IoT-based intelligent applications for the adaptive environment
are effective resource allocation, secure data transmission, and mobility management. It is …
are effective resource allocation, secure data transmission, and mobility management. It is …
Applications and challenges faced by internet of things-a survey
Abstract The Internet of Things (IoT) is a concept which expands the extent of internet by
integrating a physical object to discover them into contributing bodies. This novel idea …
integrating a physical object to discover them into contributing bodies. This novel idea …
Business ecosystem model innovation based on Internet of Things big data
Y Yang - Sustainable Energy Technologies and Assessments, 2023 - Elsevier
The research paper presents a novel big data technique for conceptual modelling of Internet
of Things (IoT) networks. This method enables the development of models that incorporate …
of Things (IoT) networks. This method enables the development of models that incorporate …
A privacy-preserving code-based authentication protocol for Internet of Things
Abstract The Internet of Things (IoT) is an upcoming technology that permits to interconnect
different devices and machines using heterogeneous networks. One of the most critical …
different devices and machines using heterogeneous networks. One of the most critical …