Ausgabe 5/2024
Inhalt (48 Artikel)
HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks
K. Dinesh, S. V. N. Santhosh Kumar
An IMOA DV-Hop localization algorithm in WSN based on hop count and hop distance correction
Xiuwu Yu, Wei Peng, Zixiang Zhou, Ke Zhang, Yong Liu
Small target disease detection based on YOLOv5 framework for intelligent bridges
Tingping Zhang, Yuanjun Xiong, Shixin Jiang, Pingxi Dan, Guan Gui
Efficient non-interactive zero-knowledge proofs for quantum range verification in blockchain
B. Sriman, S. Ganesh Kumar
SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework
S. Ramya, Manivannan Doraipandian, Rengarajan Amirtharajan
Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection
Chandra Prabha Kaliappan, Kanmani Palaniappan, Devipriya Ananthavadivel, Ushasukhanya Subramanian
Feature fusion federated learning for privacy-aware indoor localization
Omid Tasbaz, Bahar Farahani, Vahideh Moghtadaiee
Advancing security and efficiency in MANET using dynamic algorithm switching
M. Vijay Anand, Anand Krishnamurthy, Karuppiah Subramanian, Saravanan Raju
A blockchain-based privacy protecting framework with multi-channel access control model for asset trading
Jing Cai, Haihui Huang, Chuang Ma, Jun Liu
IoT in energy: a comprehensive review of technologies, applications, and future directions
Oroos Arshi, Akanksha Rai, Gauri Gupta, Jitendra Kumar Pandey, Surajit Mondal
A blockchain-based auditable deduplication scheme for multi-cloud storage
Chunhua Jin, Yongliang Xu, Wenyu Qin, Jie Zhao, Ge Kan, Fugeng Zeng
LSF-IDM: Deep learning-based lightweight semantic fusion intrusion detection model for automotive
Pengzhou Cheng, Lei Hua, Haobin Jiang, Gongshen Liu
RAB: A lightweight block cipher algorithm with variable key length
Xing Zhang, Min Yang, Jian Chen, Tianning Li, Changda Wang
Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM
M. Ramesh Kumar, Pradeep Sudhakaran
Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution
J. Vellingiri, T.R. Vedhavathy, S. Senthil Pandi, C. Bala Subramanian
A secure user authentication scheme for crypto-wallet in IoT environment
Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong
PFCAS—Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks
S. Jayashree, S. V. N. Santhosh Kumar
A comprehensive survey on optimization techniques for efficient cluster based routing in WSN
P. Karpurasundharapondian, M. Selvi
Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine
Runze Wu, Baocang Wang, Zhen Zhao
BranchFusionNet: An energy-efficient lightweight framework for superior retinal vessel segmentation
Jing Qin, Zhiguang Qin, Peng Xiao
A secure location management scheme in an LEO-satellite network with dual-mobility
Qinglei Kong, Yifan Wang, Maode Ma, Xiaodong Qu, Haiyong Bao
An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking
Ashutosh Kumar Rao, Kapil Kumar Nagwanshi, Manoj Kumar Shukla
Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption
Wenju Xu, Xin Li, Yunxuan Su, Baocang Wang, Wei Zhao
Resilient enhancements of routing protocols in MANET
- Open Access
Maros Baumgartner, Jan Papaj, Natalia Kurkina, Lubomir Dobos, Anton Cizmar
A smart contract vulnerability detection method based on deep learning with opcode sequences
Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai
Incentive minimization using energy and buffer efficient routing protocol over Blockchain enabled DTN
Nabanita Das, Souvik Basu, Sipra Das Bit
Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid
Kai Zhang, Ludan Lu, Jian Zhao, Lifei Wei, Jianting Ning
Secure communication routing and attack detection in UAV networks using Gannet Walruses optimization algorithm and Sheppard Convolutional Spinal Network
Yuvaraj Renu, Velliangiri Sarveshwaran
An integrated MCDM-based charging scheduling in a WRSN with multiple MCs
Man Gun Ri, Il Gwang Kim, Se Hun Pak, Nam Jun Jong, Song Jo Kim
MS-EAR: A mobile sink based energy aware routing technique for SDN enabled WSNs
Vikas Tyagi, Samayveer Singh
Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs
Kammula Sunil Kumar, Deepak Singh, Veena Anand
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme
Rupinder Kaur, Sonia Goyal
Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection
Tae hoon Kim, Moez Krichen, Meznah A. Alamro, Alaeddine Mihoub, Gabriel Avelino Sampedro, Sidra Abbas
A hierarchical hybrid intrusion detection model for industrial internet of things
Zhendong Wang, Xin Yang, Zhiyuan Zeng, Daojing He, Sammy Chan
Proxy re-signature scheme with cryptographic reverse firewall for medical data security
Xiaodong Yang, Lizhen Wei, Songyu Li, Xiaoni Du, Caifen Wang
Enhancing paillier to fully homomorphic encryption with semi-honest TEE
Yunyi Fang, Xiaopeng Yang, Hui Zhu, Wei Xu, Yandong Zheng, Xingdong Liu, Dong Zhang
Correction to: Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs)
- Correction
Pradeep Radhakrishnan, Praveen Kumar Sugumar, Preethi Ponnan, Gopirajan Punniyakotti Varadharajan