Have a personal or library account? Click to login
Dynamic Trust-based Access Control with Hybrid Encryption for Secure IoT Applications Cover

Dynamic Trust-based Access Control with Hybrid Encryption for Secure IoT Applications

Open Access
|May 2025

References

  1. Thiruppathi, M., Vinoth Kumar, K. (2023). Seagull optimization-based feature selection with optimal extreme learning machine for intrusion detection in fog assisted WSN. Technical Gazette, 30 (5), 1547–1553. https://doi.org/10.17559/TV-20230130000295
  2. Rashid, B., Rehmani, M. H. (2016). Applications of wireless sensor networks for urban areas: A survey. Journal of Network and Computer Applications, 60, 192–219. https://doi.org/10.1016/j.jnca.2015.09.008
  3. Kumar, P., Kumar, R., Srivastava, G., Gupta, G. P., Tripathi, R., Gadekallu, T. R., Xiong, N. N. (2021). PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Transactions on Network Science and Engineering, 8 (3), 2326–2341. https://doi.org/10.1109/TNSE.2021.3089435
  4. Gopinath, S., Vinoth Kumar, K., Elayaraja, P., Parameswari, A., Balakrishnan, S., Thiruppathi, M. (2021). SCEER: Secure cluster based efficient energy routing scheme for wireless sensor networks. Materials Today: Proceedings, 45 (2), 3579–3584. https://doi.org/10.1016/j.matpr.2020.12.1096
  5. Balakrishnan, S., Vinoth Kumar, K. (2023). Hybrid sine-cosine black widow spider optimization based route selection protocol for multihop communication in IoT assisted WSN. Technical Gazette, 30 (4), 1159–1165. https://doi.org/10.17559/TV-20230201000306
  6. Kumar S., A. A., Ovsthus, K., Kristensen, L. M. (2014). An industrial perspective on wireless sensor networks — A survey of requirements, protocols, and challenges. IEEE Communications Surveys & Tutorials, 16 (3), 1391–1412. https://doi.org/10.1109/SURV.2014.012114.00058
  7. Vinoth Kumar, K., Rajakani, V. (2024). Modeling of intrusion detection system using double adaptive weighting arithmetic optimization algorithm with deep learning on Internet of Things environment. Brazilian Archives of Biology and Technology, 67, e24231010. https://doi.org/10.1590/1678-4324-2024231010
  8. Nasir, M., Javed, A. R., Tariq, M. A., Asim, M., Baker, T. (2022). Feature engineering and deep learning-based intrusion detection framework for securing edge IoT. The Journal of Supercomputing, 78, 8852–8866. https://doi.org/10.1007/s11227-021-04250-0
  9. Vinoth Kumar, K., Balakrishnan, S. (2023). Multi-objective sand piper optimization based clustering with multihop routing technique for IoT assisted WSN. Brazilian Archives of Biology and Technology, 66, e23220866. https://doi.org/10.1590/1678-4324-2023220866
  10. Osterrieder, P., Budde, L., Friedli, T. (2020). The smart factory as a key construct of Industry 4.0: A systematic literature review. International Journal of Production Economics, 221, 107476. https://doi.org/10.1016/j.ijpe.2019.08.011
  11. Vinoth Kumar, K., Thiruppathi, M. (2023). Oppositional coyote optimization based sed feature selection with deep learning model for intrusion detection in fog assisted wireless sensor network. Acta Montanistica Slovaca, 28 (2), 496–508. https://doi.org/10.46544/AMS.v28i2.18
  12. Deepa, N., Pham, Q.-V., Nguyen, D. C., Bhattacharya, S., Prabadevi, B., Gadekallu, T. R., Maddikunta, P. K. R., Fang, F., Pathirana, P. N. (2022). A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Generation Computer Systems, 131, 209–226. https://doi.org/10.1016/j.future.2022.01.017
  13. Rajakani, V., Vinoth Kumar, K. (2023). Barnacles mating optimizer with Hopfield neural network based intrusion detection in Internet of Things environment. Technical Gazette, 30 (6), 1821–1828. https://doi.org/10.17559/TV-20230414000533
  14. Pundir, S., Wazid, M., Singh, D. P., Das, A. K., Rodrigues, J. J. P. C., Park, Y. (2019). Intrusion detection protocols in wireless sensor networks integrated to the Internet of Things deployment: Survey and future challenges. IEEE Access, 8, 3343–3363. https://doi.org/10.1109/ACCESS.2019.2962829
  15. Ponni, R., JayaSankar, T., Vinoth Kumar, K. (2023). Investigations on underwater acoustic sensor networks framework for RLS enabled LoRa networks in disaster management applications. Journal of Information Science and Engineering, 39 (2), 389–406. https://doi.org/10.6688/JISE.202303_39(2).0009
Language: English
Page range: 48 - 52
Submitted on: Jul 27, 2024
|
Accepted on: Feb 4, 2025
|
Published on: May 2, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: Volume open

© 2025 A Velliangiri, Madhavi Damle, Peter Soosai Anandaraj Abraham, Jampani Satish Babu, published by Slovak Academy of Sciences, Institute of Measurement Science
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.