-
1
Low-cost group-based identity security authentication protocol for NB-IoT nodes
Published 2021-12-01Get full text
Article -
2
Low-cost group-based identity security authentication protocol for NB-IoT nodes
Published 2021-12-01Get full text
Article -
3
Cloud Computing-Based Security Analysis on Wireless Sensor Nodes Cluster Using Predictive Technique
Published 2025-05-01Get full text
Article -
4
Integrating hybrid bald eagle crow search algorithm and deep learning for enhanced malicious node detection in secure distributed systems
Published 2025-04-01“…This study designs a Hybrid Bald Eagle-Crow Search Algorithm and Deep Learning for Enhanced Malicious Node Detection (HBECSA-DLMND) technique in Secure Distributed Systems. …”
Get full text
Article -
5
G-KAN: Graph Kolmogorov-Arnold Network for Node Classification Using Contrastive Learning
Published 2025-01-01Get full text
Article -
6
Security-Enhanced Decentralized Content Sharing in Publish/Subscribe System
Published 2025-01-01“…For this purpose, we design a hierarchical node ID and content ID to create more than one virtual subnets on the dP2PN, and show that our proposed dP2PN based on the hierarchical IDs is superior to the conventional dP2PN in terms of routing efficiency, ease of network configuration, and security. …”
Get full text
Article -
7
An efficient and high-performance WSNs restoration algorithm for fault nodes based on FT in data aggregation scheduling
Published 2025-12-01“…Nevertheless, in the process of data aggregation scheduling, if there are fault nodes, the data quality collected by the whole network will decline, and the network performance will decrease, even posing a threat to network security or causing network paralysis. …”
Get full text
Article -
8
Secure energy outage analysis of UAV swarm-based network.
Published 2025-01-01“…UAVs, often deployed as relay nodes to facilitate communication between a source and a destination, face significant security and energy efficiency challenges, particularly when relying on battery-free configurations. …”
Get full text
Article -
9
Performance comparison of different algorithms to secure the information for Wireless sensor Network
Published 2024-01-01“…Through a detailed comparison of these methodologies, this paper highlights their respective advantages, limitations, and potential applications in term of security and energy. The findings suggest that while cluster-based routing is well-suited for energy-efficient networks with stable topologies, trust-based routing offers superior security features, making it ideal for environments with higher risks of node compromise, and the blockchain associated to the CNN ensure a high security.…”
Get full text
Article -
10
Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs
Published 2025-07-01“…It assures that no other unauthorized nodes are allowed in the communication. Next, the data is sent over the trusted secure route selected by proposed approach. …”
Get full text
Article -
11
A Secure and Green Cognitive Routing Protocol for Wireless Ad-Hoc Networks
Published 2024-01-01Get full text
Article -
12
Secure Data Aggregation in Wireless Multimedia Sensor Networks Based on Similarity Matching
Published 2014-04-01“…The proposal scheme divides multimedia data into multiple different pieces, and transmits the effective pieces to the selected sensor nodes. Through theoretical justifications and empirical studies, we demonstrate that the proposed scheme achieves substantially superior performances over conventional methods in terms of energy efficiency and data transmission under the resource-constrained wireless multimedia sensor networks.…”
Get full text
Article -
13
Federated Reinforcement Learning in Stock Trading Execution: The FPPO Algorithm for Information Security
Published 2025-01-01Get full text
Article -
14
A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps
Published 2021-01-01“…The proposed scheme consists of two parts, secure image transmission between sensor nodes and sink nodes (SIT-SS) and secure image transmission between sensor nodes and receivers (SIT-SR). …”
Get full text
Article -
15
Bioinspired Blockchain Framework for Secure and Scalable Wireless Sensor Network Integration in Fog–Cloud Ecosystems
Published 2024-12-01“…It integrates lightweight blockchain technology with bioinspired algorithms, including an AIS for anomaly detection and a Proof of Adaptive Immunity Consensus mechanism for secure resource-efficient blockchain validation. Experimental evaluations give proof of the superior performance reached within this framework: up to 95.2% of anomaly detection accuracy, average energy efficiency of 91.2% when the traffic flow is normal, and latency as low as 15.2 ms during typical IoT scenarios. …”
Get full text
Article -
16
Blockchain-enabled federated learning with edge analytics for secure and efficient electronic health records management
Published 2025-07-01“…Compared to state-of-the-art models, EPP-BCFL exhibits superior performance in terms of security, scalability, and support for edge device heterogeneity, validating its applicability in secure EHR management.…”
Get full text
Article -
17
Secure Scan Architecture for Enhanced Testability and Resistance Against Side-Channel Attacks in Cryptographic ICs
Published 2025-01-01“…These results prove the proposed secure scan architecture to be a very effective and resource-optimized solution for advanced cryptographic and integrated circuit applications with a superior tradeoff between security, testability, and efficiency.…”
Get full text
Article -
18
Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain
Published 2025-12-01“…The proposed protocol integrates edge computing and blockchain to ensure secure, efficient mutual authentication between RFID tags and supply chain nodes. …”
Get full text
Article -
19
AdaptedNorm: An Adaptive Modeling Strategy for Graph Convolutional Network-Based Deep Learning Tasks
Published 2025-01-01Get full text
Article -
20
Enhancing MANET Security Through Federated Learning and Multiobjective Optimization: A Trust-Aware Routing Framework
Published 2024-01-01“…Traditional routing protocols often struggle to adapt to rapidly changing topologies and potential malicious nodes, compromising network performance and security. …”
Get full text
Article