We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,312 results
  1. Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks

    In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices and improve the overall Quality of Life (QoL) for...

    Shraiyash Pandey, Bharat Bhushan in Wireless Networks
    Article 25 March 2024
  2. Lightweight Certificateless Signature Scheme for Resource-Constrained IoT Environment

    With the widespread application of the Internet of things (IoT), the resource-constrained nature of IoT devices makes the security issues...
    Conference paper 2024
  3. ACS-IoT: Smart Contract and Blockchain Assisted Framework for Access Control Systems in IoT Enterprise Environment

    Centralized access control systems are unsuitable for IoT due to their resource-constrained, heterogeneous, and dynamic nature. Blockchain-assisted...

    Aqsa Rashid, Asif Masood, Atta ur Rehman Khan in Wireless Personal Communications
    Article 26 June 2024
  4. A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks

    Resource-constrained Devices are extensively used on the Internet of Things (IoT). WSN, RFID, and embedded systems are examples of these devices that...

    Neda Solari Esfehani, Hamid Haj Seyyed Javadi in Wireless Personal Communications
    Article 08 July 2022
  5. Machine Learning Techniques for Resource-Constrained Devices in IoT Applications with CP-ABE Scheme

    Ciphertext-policy attribute-based encryption (CP-ABE) is one of the promising schemes which provides security and fine-grain access control for...
    P. R. Ancy, Addapalli V. N. Krishna in Third Congress on Intelligent Systems
    Conference paper 2023
  6. Federated Learning for Resource-Constrained IoT Devices: Panoramas and State of the Art

    Nowadays, devices are equipped with advanced sensors with higher processing and computing capabilities. Besides, widespread Internet availability...
    Ahmed Imteaj, Khandaker Mamun Ahmed, ... M. Hadi Amini in Federated and Transfer Learning
    Chapter 2023
  7. Data management for resource optimization in medical IoT

    Purpose

    Medical IoT plays a substantial role in improving healthcare and patient monitoring. Enhancing the quality of healthcare system is a vibrant...

    Iqra Jan, Shabir Sofi in Health and Technology
    Article 28 November 2023
  8. A digital twin-driven multi-resource constrained location system for resource allocation

    Smart manufacturing systems combine sensor systems and manufacturing processes, and they have been widely adopted in the industry to solve real...

    Article 16 January 2024
  9. Soft Error Reliability Assessment of ML Inference Models Executing on Resource-Constrained IoT Edge Devices

    This Chapter provides in-depth insights and results related to the second main contribution of this Book: the early soft error assessment and...
    Chapter 2023
  10. Flexible symmetric predicate encryption for data privacy in IoT environments

    Internet of Things (IoT) applications are revolutionizing lifestyles and social management. In IoT environments, there is a need to deploy a large...

    Qingquan Bian, Yue Zhang, ... Axin Wu in Peer-to-Peer Networking and Applications
    Article 11 January 2024
  11. A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment

    The Internet of things (IoT) has advanced as an innovation to build smart situations such as industrial processes, home automation, smart cities, and...
    A. Durga Bhavani, Neha Mangla in Mobile Computing and Sustainable Informatics
    Conference paper 2022
  12. A Survey on RFID Mutual Authentication Protocols Based ECC for Resource-Constrained in IoT Environment

    The Internet of things (IoT) has been emerged as the new technology that forms the foundation of today’s intelligent and connected world. Radio...
    Hind Timouhin, Fatima Amounas, Mourade Azrour in Artificial Intelligence, Data Science and Applications
    Conference paper 2024
  13. Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT

    Internet of Medical Things (IoMT) is mainly composed of patients, doctors and medical data collection equipment. In IoMT, the health data of patients...

    Chingfang Hsu, Lein Harn, ... Hang Xu in Wireless Personal Communications
    Article 08 March 2023
  14. Outage probability constrained resource allocation scheme in two-tier cooperative NOMA network with SWIPT

    In this paper, we consider a two-tier three phases simultaneous wireless information and power transfer (SWIPT)-enabled down-link cooperative...

    Lei Gao, Zhixin Liu, ... Yazhou Yuan in Wireless Networks
    Article 21 May 2024
  15. Collaborative Localization Strategy Based on Node Selection and Power Allocation in Resource-Constrained Environments

    Accurate positioning in the constrained environment of Global Navigation satellite Systems (GNSS) is a challenging problem, especially in...

    Geng Chen, Qingbin Wang, ... Qingtian Zeng in Mobile Networks and Applications
    Article 14 May 2024
  16. Optimizing multi-objective construction management for resource-constrained project scheduling problems: a bio-inspired approach

    The optimization challenge of the multi-mode resource-constrained project scheduling problem (MRCPSP) involves balancing both project makespan (Cmax)...

    Vu Hong Son Pham, Loc Tin Huynh in Asian Journal of Civil Engineering
    Article 19 June 2024
  17. A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network

    Currently, IoT is being used as a novel tool in many applications. Some applications use the end nodes such as wireless sensor network, RFID and...

    Neda Solari Esfehani, Hamid Haj Seyyed Javadi in Wireless Networks
    Article 07 May 2021
  18. LAPE2D: Lightweight Authentication Protocol to Secure End and Edge Devices in Iot Framework

    The Internet of Things (IoT) is omnipresent in every industry and has extended its footprint in various domains. This IoT device augmentation in...

    S. Ramya, Manivannan Doraipndian, Rengarajan Amirtharajan in Wireless Personal Communications
    Article 09 June 2023
  19. Lightweight Block Cipher for Resource Constrained IoT Environment—An Survey, Performance, Cryptanalysis and Research Challenges

    Nowadays IoT (Internet of Things) is becoming a more popular environment and has a variety of applications like Smart Home, Smart Healthcare,...
    Conference paper 2023
  20. Towards programmable IoT with ActiveNDN

    We propose to perform robust distributed computation, such as analysing and filtering raw data in real time, as close as possible to sensors in an...

    Preechai Mekbungwan, Adisorn Lertsinsrubtavee, ... Kanchana Kanchanasut in Annals of Telecommunications
    Article 04 July 2023
Did you find what you were looking for? Share feedback.