Ausgabe 4/2023
Inhalt (26 Artikel)
ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks
Du Chen, Deyun Gao, Lu Jin, Wei Quan, Hongke Zhang
A RSS-based path loss model approaches multi-dimensional scaling to localize 2D sensor nodes in WSN
Vijay Rayar, Udaykumar Naik, Prabhakar S. Manage
A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNs
Nour El Houda Bourebia, Chunlin Li
Integrating the edge intelligence technology into image composition: A case study
Peiyan Yuan, Zhao Han, Xiaoyan Zhao
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance
Tao Li, Yali Liu, Jianting Ning
Joint task assignment and path planning for truck and drones in mobile crowdsensing
Zijia Wang, Baoxian Zhang, Yangxia Xiang, Cheng Li
Anomaly traffic detection based on feature fluctuation for secure industrial internet of things
Jie Yin, Chuntang Zhang, Wenwei Xie, Guangjun Liang, Lanping Zhang, Guan Gui
A composite blockchain associated event traceability method for financial activities
Junlu Wang, Su Li, Ji Wanting, Dong Li, Baoyan Song
A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system
Shengchen Duan, Hong Liu, Lize Gu
Quality of service aware routing in software defined video streaming: a survey
Suguna Paramasivam, R Leela Velusamy
ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANET
A. Anu Monisha, T. R. Reshmi, K. Murugan
perbp: a cloud-based lightweight mutual authentication protocol
Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari
Parked vehicles crowdsourcing for task offloading in vehicular edge computing
Feng Zeng, Ranran Rou, Qi Deng, Jinsong Wu
Enhanced Elman Spike Neural Network fostered intrusion detection framework for securing wireless sensor network
R. Sarath Kumar, P. Sampath, M Ramkumar
Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs
Xiaoyan Hu, Weicheng Zhou, Jun Yin, Guang Cheng, Shen Yan, Hua Wu
TRP: A TOPSIS-based RSU-enabled priority scheduling scheme to disseminate alert messages of WBAN sensors in hybrid VANETs
Bidisha Bhabani, Judhistir Mahapatro
IoT intrusion detection model based on gated recurrent unit and residual network
Guosheng Zhao, Cai Ren, Jian Wang, Yuyan Huang, Huan Chen
A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things
Elham Ebrahimpour, Shahram Babaie
Bit flipping attack detection in low power wide area networks using a deep learning approach
Faezeh Alizadeh, Amir Jalaly Bidgoly
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain
Bei Yu, Libo Feng, Hongyu Zhu, Fei Qiu, Ji Wan, Shaowen Yao
A task allocation method based on data fusion of multimodal trajectory in mobile crowd sensing
Jia Liu, Jian Wang, Yuping Yan, Guosheng Zhao
An optimal model for enhancing network lifetime and cluster head selection using hybrid snake whale optimization
Duraimurugan Samiayya, S. Radhika, Chandrasekar A.
A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
Ravi Raushan Kumar Chaudhary, Kakali Chatterjee
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization
S. Sivamohan, S. S. Sridhar, S. Krishnaveni