Ausgabe 2/2025
Inhalt (49 Artikel)
BBAD: Blockchain-based data assured deletion and access control system for IoT
- Open Access
Yuxuan Meng, Baosheng Wang, Qianqian Xing, Xiaofeng Wang, Jian Liu, Xinyue Xu
A lightweight IoT device identification using enhanced behavioral-based features
Mahdi Rabbani, Jinkun Gui, Zeming Zhou, Fatemeh Nejati, Mansur Mirani, Gunjan Piya, Igor Opushnyev, Rongxing Lu, Ali Ghorbani
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system
Nandhini U, S. V. N. Santhosh Kumar
A secure digital evidence preservation system for an iot-enabled smart environment using ipfs, blockchain, and smart contracts
Deepti Rani, Nasib Singh Gill, Preeti Gulia, Mohammad Yahya, Tariq Ahamed Ahanger, Mohamed M. Hassan, Fethi Ben Abdallah, Piyush Kumar Shukla
Unified modeling and evaluation of availability and power consumption in the internet of things
Amir Soleimani Borujerdi, Arman Sanahmadi, Mohammad Abdollahi Azgomi
Enhancing security in electronic health records using an adaptive feature-centric polynomial data security model with blockchain integration
D. Dhinakaran, R. Ramani, S. Edwin Raja, D. Selvaraj
Hybrid Termite Queen and Walrus Optimization Algorithm-based energy efficient cluster-based routing with static and mobile sink node in WSNs
PL Rajarajeswari, Brindha Devi V, Angel Latha Mary S
Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks
D. S. Bhupal Naik, Venkatesulu Dondeti
Mitigating bias in heterogeneous federated learning via stratified client selection
Yazhi Liu, Haonan Xia, Wei Li, Teng Niu
Optimized auxiliary physics neural network based multi-target detection for edge-cloud in smart internet of things
B. Prabha, Mallikarjun Yaramadhi, Abhishek Sharma, K Padmanaban
AAQ-PEKS: An Attribute-based Anti-Quantum Public Key Encryption Scheme with Keyword Search for E-healthcare Scenarios
Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Yanhui Mao, Xiu-Bo Chen, Mianxiong Dong, Shui Yu
Boosted sooty tern and piranhav foraging meta-heuristic optimized cluster head selection-based routing algorithm for extending network lifetime in WSNs
R. S. Amshavalli, D. Devi, S. Srinivasan, R ShaliniRajan, S Anitha Jebamani
Classification of intrusion using Multi-Stream Generative Adversarial Networks in Wireless Sensor Networks
D. Prabakar, Konda Hari Krishna, D. Prabhu, Femila L
A privacy preserving batch audit scheme for IoT based cloud data storage
S. Milton Ganesh, S. Priya, Vinayakumar Ravi, Suliman A. Alsuhibany
A multi-factor user authentication protocol for the internet of drones environment
Manuela de Jesus Sousa, Paulo Roberto L. Gondim
An efficient and secured voting system using blockchain and hybrid validation technique with deep learning
M. Elhoseny, Hashem Alyami, Majid Altuwairiqi, Papiya Dutta, Bala Dhandayuthapani Veerasamy, Piyush Kumar Shukla
Efficient multi-job federated learning scheduling with fault tolerance
Boqian Fu, Fahao Chen, Shengli Pan, Peng Li, Zhou Su
A steganographic backdoor attack scheme on encrypted traffic
Bing Rao, Guiqin Zhu, Qiaolong Ding, Dajiang Chen, Mingsheng Cao, Yang Cao, Feiyan Wang
AIoT-enabled service prioritization for mobile nodes using enhanced PMIPv6 extension protocol
Habib Ullah Khan, Anwar Hussain, Shah Nazir, Farhad Ali
Startup delay aware short video ordering: Problem, model, and a reinforcement learning based algorithm
Zhipeng Gao, Chunxi Li, Yongxiang Zhao, Baoxian Zhang, Cheng Li
IoT-enabled wireless sensor networks optimization based on federated reinforcement learning for enhanced performance
Gummarekula Sattibabu, Nagarajan Ganesan, R. Senthil Kumaran
Novel joint data collection and wireless charging algorithm for rechargeable wireless sensor networks
Pankaj Chandra, Santosh Soni
QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization
Vinothini J, Srie Vidhya Janani E
Strengthening security in IoT-based smart cities utilizing cycle-consistent generative adversarial networks for attack detection and secure data transmission
Agitha W, D. R. Denslin Brabin, K. Kalai Kumar, T. Sunitha
NHBBWO: A novel hybrid butterfly-beluga whale optimization algorithm with the dynamic strategy for WSN coverage optimization
Xinyi Chen, Mengjian Zhang, Ming Yang, Deguang Wang
Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit
Md. Mobin Akhtar, Sultan Ali Alasmari, Sk Wasim Haidar, Ali Abdulaziz Alzubaidi
MobiPower: Scheduling mobile charging stations for UAV-mounted edge servers in Internet of Vehicles
Aiwen Huang, Xianger Li, Xuyang Chen, Wei Song, Zhihai Tang, Le Chang, Tian Wang
An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT
Tsu-Yang Wu, Haozhi Wu, Saru Kumari, Chien-Ming Chen
End-to-end supervised learning for NOMA-enabled resource allocation: A dynamic and scalable approach
Leyou Yang, Jie Jia, Jian Chen, Baoxin Yin, Xingwei Wang
Blockchain-based synchronized data transmission with dynamic device management for digital twin in IIoT
Le Chang, Xinyan Yang, Kai Zhang, Zhimei Sui, Jian Zhao
IPML-ANP: An integrated polynomial manifold learning model and anchor node placement for wireless sensor node localization
John Peter K., Predeep Kumar S.P., Padmalal S., Sahaya Kingsly C.
Joint scheduling and routing for end-to-end deterministic transmission in TSN
Jie Jia, Yiyue Zhang, Yi Xue, Jian Chen, An Du, Xingwei Wang
LVCA: An efficient voting-based consensus algorithm in private Blockchain for enhancing data security
Sudhani Verma, Girish Chandra, Divakar Yadav
A comprehensive and efficient CP-ABE scheme with full policy hiding and pre-decryption verification in peer-to-peer cyber-physical systems
Xingwen Zhao, Xuan Wang, Haimei Guan, Jiayin Cai, Hui Li, Qingwen Li
An efficient and private economic evaluation scheme in data markets
Bing Han, Yong Yuan, Xuhao Ren, Zihang Yin, Cheng Chi, Chuan Zhang
AccessChain: A scalable and privacy-preserving access control scheme for blockchain-based IoT
Guirong Piao, Jianming Zhu
Service caching with multi-agent reinforcement learning in cloud-edge collaboration computing
Yinglong Li, Zhengjiang Zhang, Han-Chieh Chao
CoHide: Overlapping community hiding algorithm based on multi-criteria learning optimization
Zi-xuan Han, Lei-lei Shi, Ya-si Wang, Lu Liu, Bing Lei, Xiu-liang Huang, Liang Jiang, John Panneerselvam, Ren-jiao Gao
A binary multi-objective approach for solving the WMNs topology planning problem
Sylia Mekhmoukh Taleb, Karim Baiche, Yassine Meraihi, Selma Yahia, Seyedali Mirjalili, Amar Ramdane-Cherif
Research on distributed UWSN power control algorithm based on cooperative game
Libin Xue, Chunjie Cao
A highly secure and stable energy aware multi-objective constraints-based hybrid optimization algorithms for effective optimal cluster head selection and routing in wireless sensor networks
Rakesh Kumar Godi, Santosh Reddy P, Shobha. N, B. Vikranth Bhoothpur, Abhijit Das
Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain