Showing 1 - 20 results of 67 for search 'superior node. Security', query time: 0.10s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Integrating hybrid bald eagle crow search algorithm and deep learning for enhanced malicious node detection in secure distributed systems by Feras Mohammed Al-Matarneh

    Published 2025-04-01
    “…This study designs a Hybrid Bald Eagle-Crow Search Algorithm and Deep Learning for Enhanced Malicious Node Detection (HBECSA-DLMND) technique in Secure Distributed Systems. …”
    Get full text
    Article
  5. 5
  6. 6

    Security-Enhanced Decentralized Content Sharing in Publish/Subscribe System by Wang-Seok Park, Chang-Seop Park, Samuel Woo

    Published 2025-01-01
    “…For this purpose, we design a hierarchical node ID and content ID to create more than one virtual subnets on the dP2PN, and show that our proposed dP2PN based on the hierarchical IDs is superior to the conventional dP2PN in terms of routing efficiency, ease of network configuration, and security. …”
    Get full text
    Article
  7. 7

    An efficient and high-performance WSNs restoration algorithm for fault nodes based on FT in data aggregation scheduling by Cheng Li, Guoyin Zhang

    Published 2025-12-01
    “…Nevertheless, in the process of data aggregation scheduling, if there are fault nodes, the data quality collected by the whole network will decline, and the network performance will decrease, even posing a threat to network security or causing network paralysis. …”
    Get full text
    Article
  8. 8

    Secure energy outage analysis of UAV swarm-based network. by Tien Hoa Nguyen, Hoang Vu Tran

    Published 2025-01-01
    “…UAVs, often deployed as relay nodes to facilitate communication between a source and a destination, face significant security and energy efficiency challenges, particularly when relying on battery-free configurations. …”
    Get full text
    Article
  9. 9

    Performance comparison of different algorithms to secure the information for Wireless sensor Network by El Gatte Oumayma, El Abbassi Ahmed, Mouhib Omar, Tilioua Amine

    Published 2024-01-01
    “…Through a detailed comparison of these methodologies, this paper highlights their respective advantages, limitations, and potential applications in term of security and energy. The findings suggest that while cluster-based routing is well-suited for energy-efficient networks with stable topologies, trust-based routing offers superior security features, making it ideal for environments with higher risks of node compromise, and the blockchain associated to the CNN ensure a high security.…”
    Get full text
    Article
  10. 10

    Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs by N. Naveen, J. Nirmaladevi

    Published 2025-07-01
    “…It assures that no other unauthorized nodes are allowed in the communication. Next, the data is sent over the trusted secure route selected by proposed approach. …”
    Get full text
    Article
  11. 11
  12. 12

    Secure Data Aggregation in Wireless Multimedia Sensor Networks Based on Similarity Matching by Rui Gao, Yingyou Wen, Hong Zhao, Yinghui Meng

    Published 2014-04-01
    “…The proposal scheme divides multimedia data into multiple different pieces, and transmits the effective pieces to the selected sensor nodes. Through theoretical justifications and empirical studies, we demonstrate that the proposed scheme achieves substantially superior performances over conventional methods in terms of energy efficiency and data transmission under the resource-constrained wireless multimedia sensor networks.…”
    Get full text
    Article
  13. 13
  14. 14

    A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps by Wei Feng, Jing Zhang, Zhentao Qin

    Published 2021-01-01
    “…The proposed scheme consists of two parts, secure image transmission between sensor nodes and sink nodes (SIT-SS) and secure image transmission between sensor nodes and receivers (SIT-SR). …”
    Get full text
    Article
  15. 15

    Bioinspired Blockchain Framework for Secure and Scalable Wireless Sensor Network Integration in Fog–Cloud Ecosystems by Abdul Rehman, Omar Alharbi

    Published 2024-12-01
    “…It integrates lightweight blockchain technology with bioinspired algorithms, including an AIS for anomaly detection and a Proof of Adaptive Immunity Consensus mechanism for secure resource-efficient blockchain validation. Experimental evaluations give proof of the superior performance reached within this framework: up to 95.2% of anomaly detection accuracy, average energy efficiency of 91.2% when the traffic flow is normal, and latency as low as 15.2 ms during typical IoT scenarios. …”
    Get full text
    Article
  16. 16

    Blockchain-enabled federated learning with edge analytics for secure and efficient electronic health records management by Munusamy S, Jothi K R

    Published 2025-07-01
    “…Compared to state-of-the-art models, EPP-BCFL exhibits superior performance in terms of security, scalability, and support for edge device heterogeneity, validating its applicability in secure EHR management.…”
    Get full text
    Article
  17. 17

    Secure Scan Architecture for Enhanced Testability and Resistance Against Side-Channel Attacks in Cryptographic ICs by A. Swetha Priya, S. Kamatchi, E. Lakshmi Prasad

    Published 2025-01-01
    “…These results prove the proposed secure scan architecture to be a very effective and resource-optimized solution for advanced cryptographic and integrated circuit applications with a superior tradeoff between security, testability, and efficiency.…”
    Get full text
    Article
  18. 18

    Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain by Vikash Kumar, Santosh Kumar Das

    Published 2025-12-01
    “…The proposed protocol integrates edge computing and blockchain to ensure secure, efficient mutual authentication between RFID tags and supply chain nodes. …”
    Get full text
    Article
  19. 19
  20. 20

    Enhancing MANET Security Through Federated Learning and Multiobjective Optimization: A Trust-Aware Routing Framework by Saad M. Hassan, Mohd Murtadha Mohamad, Farkhana Binti Muchtar, Firoz Bin Yusuf Patel Dawoodi

    Published 2024-01-01
    “…Traditional routing protocols often struggle to adapt to rapidly changing topologies and potential malicious nodes, compromising network performance and security. …”
    Get full text
    Article