Trust Based Anonymous Intrusion Detection for Cloud Assisted WSN-IOT

[1]  Gautam Srivastava,et al.  Deep Learning-Embedded Social Internet of Things for Ambiguity-Aware Social Recommendations , 2022, IEEE Transactions on Network Science and Engineering.

[2]  S. Jayachitra,et al.  A Tuned classification approach for efficient heterogeneous fault diagnosis in IoT-enabled WSN applications , 2021 .

[3]  Changyuan Wang,et al.  An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[4]  Ado Adamou Abba Ari,et al.  Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme , 2021, KSII Trans. Internet Inf. Syst..

[5]  Keping Yu,et al.  Robust Spammer Detection Using Collaborative Neural Network in Internet-of-Things Applications , 2021, IEEE Internet of Things Journal.

[6]  B. R. Purushothama,et al.  Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game , 2021, SN Computer Science.

[7]  Sedat Akleylek,et al.  Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security , 2021, J. Inf. Secur. Appl..

[8]  Korhan Cengiz,et al.  Hybrid Cache Management in IoT-Based Named Data Networking , 2021, IEEE Internet of Things Journal.

[9]  Chien-Ming Chen,et al.  A secure blockchain-based group key agreement protocol for IoT , 2021, The Journal of Supercomputing.

[10]  Yaser Jararweh,et al.  Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT , 2021, IEEE Transactions on Industrial Informatics.

[11]  Alaa Hamid Mohammed,et al.  Wireless Sensor Networks Mutual Policy For Position Protection , 2020, 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT).

[12]  Kiran,et al.  Analysis and Computation of Encryption Technique to Enhance Security of Medical Images , 2020, IOP Conference Series: Materials Science and Engineering.

[13]  Ashok Kumar Das,et al.  A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT , 2020, Comput. Networks.

[14]  Ikram Ud Din,et al.  An Energy Efficient and Secure IoT-Based WSN Framework: An Application to Smart Agriculture , 2020, Sensors.

[15]  A. Karthikeyan,et al.  Secured Identity Based Cryptosystem Approach for Intelligent Routing Protocol in VANET , 2020, Scalable Computing: Practice and Experience.

[16]  Mohammed Amin Almaiah,et al.  MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks , 2020, IEEE Access.

[17]  Euijong Lee,et al.  A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security , 2020, IEEE Access.

[18]  Anwar Ghani,et al.  An Improved three-factor anonymous Authentication Protocol for WSN s based IoT System Using Symmetric cryptography , 2019, 2019 International Conference on Communication Technologies (ComTech).

[19]  Hsu-Chun Hsiao,et al.  GroupIt: Lightweight Group Key Management for Dynamic IoT Environments , 2018, IEEE Internet of Things Journal.

[20]  G. R. Kanagachidambaresan,et al.  An energy-aware buffer management (EABM) routing protocol for WSN , 2018, The Journal of Supercomputing.

[21]  Rajashekarappa,et al.  Optimized neighbor discovery in Internet of Things (IoT) , 2017, 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT).

[22]  G. F. Ali Ahammed,et al.  Cloud Computing – A Unified Approach for Surveillance Issues , 2017 .

[23]  Sajjad Shaukat Jamal,et al.  IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks , 2021, IEEE Access.

[24]  Noor Zaman,et al.  Robust Cluster-Based Routing Protocol for IoT-Assisted Smart Devices in WSN , 2021, Computers, Materials & Continua.

[25]  Gurjot Singh Gaba,et al.  A Lightweight Authentication Protocol using Implicit Certificates for Securing IoT Systems , 2020 .

[26]  Dinh Thai Hoang,et al.  Efficient SDN-Based Traffic Monitoring in IoT Networks with Double Deep Q-Network , 2020, CSoNet.

[27]  Xiong Luo,et al.  Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN , 2019, IEEE Access.