Trust Based Anonymous Intrusion Detection for Cloud Assisted WSN-IOT
暂无分享,去创建一个
[1] Gautam Srivastava,et al. Deep Learning-Embedded Social Internet of Things for Ambiguity-Aware Social Recommendations , 2022, IEEE Transactions on Network Science and Engineering.
[2] S. Jayachitra,et al. A Tuned classification approach for efficient heterogeneous fault diagnosis in IoT-enabled WSN applications , 2021 .
[3] Changyuan Wang,et al. An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[4] Ado Adamou Abba Ari,et al. Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme , 2021, KSII Trans. Internet Inf. Syst..
[5] Keping Yu,et al. Robust Spammer Detection Using Collaborative Neural Network in Internet-of-Things Applications , 2021, IEEE Internet of Things Journal.
[6] B. R. Purushothama,et al. Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game , 2021, SN Computer Science.
[7] Sedat Akleylek,et al. Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security , 2021, J. Inf. Secur. Appl..
[8] Korhan Cengiz,et al. Hybrid Cache Management in IoT-Based Named Data Networking , 2021, IEEE Internet of Things Journal.
[9] Chien-Ming Chen,et al. A secure blockchain-based group key agreement protocol for IoT , 2021, The Journal of Supercomputing.
[10] Yaser Jararweh,et al. Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT , 2021, IEEE Transactions on Industrial Informatics.
[11] Alaa Hamid Mohammed,et al. Wireless Sensor Networks Mutual Policy For Position Protection , 2020, 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT).
[12] Kiran,et al. Analysis and Computation of Encryption Technique to Enhance Security of Medical Images , 2020, IOP Conference Series: Materials Science and Engineering.
[13] Ashok Kumar Das,et al. A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT , 2020, Comput. Networks.
[14] Ikram Ud Din,et al. An Energy Efficient and Secure IoT-Based WSN Framework: An Application to Smart Agriculture , 2020, Sensors.
[15] A. Karthikeyan,et al. Secured Identity Based Cryptosystem Approach for Intelligent Routing Protocol in VANET , 2020, Scalable Computing: Practice and Experience.
[16] Mohammed Amin Almaiah,et al. MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks , 2020, IEEE Access.
[17] Euijong Lee,et al. A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security , 2020, IEEE Access.
[18] Anwar Ghani,et al. An Improved three-factor anonymous Authentication Protocol for WSN s based IoT System Using Symmetric cryptography , 2019, 2019 International Conference on Communication Technologies (ComTech).
[19] Hsu-Chun Hsiao,et al. GroupIt: Lightweight Group Key Management for Dynamic IoT Environments , 2018, IEEE Internet of Things Journal.
[20] G. R. Kanagachidambaresan,et al. An energy-aware buffer management (EABM) routing protocol for WSN , 2018, The Journal of Supercomputing.
[21] Rajashekarappa,et al. Optimized neighbor discovery in Internet of Things (IoT) , 2017, 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT).
[22] G. F. Ali Ahammed,et al. Cloud Computing – A Unified Approach for Surveillance Issues , 2017 .
[23] Sajjad Shaukat Jamal,et al. IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks , 2021, IEEE Access.
[24] Noor Zaman,et al. Robust Cluster-Based Routing Protocol for IoT-Assisted Smart Devices in WSN , 2021, Computers, Materials & Continua.
[25] Gurjot Singh Gaba,et al. A Lightweight Authentication Protocol using Implicit Certificates for Securing IoT Systems , 2020 .
[26] Dinh Thai Hoang,et al. Efficient SDN-Based Traffic Monitoring in IoT Networks with Double Deep Q-Network , 2020, CSoNet.
[27] Xiong Luo,et al. Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN , 2019, IEEE Access.