Search
Search Results
-
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices and improve the overall Quality of Life (QoL) for...
-
Lightweight Certificateless Signature Scheme for Resource-Constrained IoT Environment
With the widespread application of the Internet of things (IoT), the resource-constrained nature of IoT devices makes the security issues... -
ACS-IoT: Smart Contract and Blockchain Assisted Framework for Access Control Systems in IoT Enterprise Environment
Centralized access control systems are unsuitable for IoT due to their resource-constrained, heterogeneous, and dynamic nature. Blockchain-assisted...
-
A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks
Resource-constrained Devices are extensively used on the Internet of Things (IoT). WSN, RFID, and embedded systems are examples of these devices that...
-
Machine Learning Techniques for Resource-Constrained Devices in IoT Applications with CP-ABE Scheme
Ciphertext-policy attribute-based encryption (CP-ABE) is one of the promising schemes which provides security and fine-grain access control for... -
Federated Learning for Resource-Constrained IoT Devices: Panoramas and State of the Art
Nowadays, devices are equipped with advanced sensors with higher processing and computing capabilities. Besides, widespread Internet availability... -
Data management for resource optimization in medical IoT
PurposeMedical IoT plays a substantial role in improving healthcare and patient monitoring. Enhancing the quality of healthcare system is a vibrant...
-
A digital twin-driven multi-resource constrained location system for resource allocation
Smart manufacturing systems combine sensor systems and manufacturing processes, and they have been widely adopted in the industry to solve real...
-
Soft Error Reliability Assessment of ML Inference Models Executing on Resource-Constrained IoT Edge Devices
This Chapter provides in-depth insights and results related to the second main contribution of this Book: the early soft error assessment and... -
Flexible symmetric predicate encryption for data privacy in IoT environments
Internet of Things (IoT) applications are revolutionizing lifestyles and social management. In IoT environments, there is a need to deploy a large...
-
A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment
The Internet of things (IoT) has advanced as an innovation to build smart situations such as industrial processes, home automation, smart cities, and... -
A Survey on RFID Mutual Authentication Protocols Based ECC for Resource-Constrained in IoT Environment
The Internet of things (IoT) has been emerged as the new technology that forms the foundation of today’s intelligent and connected world. Radio... -
Fast and Lightweight Authenticated Group Key Agreement Realizing Privacy Protection for Resource-Constrained IoMT
Internet of Medical Things (IoMT) is mainly composed of patients, doctors and medical data collection equipment. In IoMT, the health data of patients...
-
Outage probability constrained resource allocation scheme in two-tier cooperative NOMA network with SWIPT
In this paper, we consider a two-tier three phases simultaneous wireless information and power transfer (SWIPT)-enabled down-link cooperative...
-
Collaborative Localization Strategy Based on Node Selection and Power Allocation in Resource-Constrained Environments
Accurate positioning in the constrained environment of Global Navigation satellite Systems (GNSS) is a challenging problem, especially in...
-
Optimizing multi-objective construction management for resource-constrained project scheduling problems: a bio-inspired approach
The optimization challenge of the multi-mode resource-constrained project scheduling problem (MRCPSP) involves balancing both project makespan (Cmax)...
-
A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network
Currently, IoT is being used as a novel tool in many applications. Some applications use the end nodes such as wireless sensor network, RFID and...
-
LAPE2D: Lightweight Authentication Protocol to Secure End and Edge Devices in Iot Framework
The Internet of Things (IoT) is omnipresent in every industry and has extended its footprint in various domains. This IoT device augmentation in...
-
Lightweight Block Cipher for Resource Constrained IoT Environment—An Survey, Performance, Cryptanalysis and Research Challenges
Nowadays IoT (Internet of Things) is becoming a more popular environment and has a variety of applications like Smart Home, Smart Healthcare,... -
Towards programmable IoT with ActiveNDN
We propose to perform robust distributed computation, such as analysing and filtering raw data in real time, as close as possible to sensors in an...