-
Farrukh H., Ozmen M., Kerem Ors F. Celik Z. One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices. 2023 IEEE Symposium on Security and Privacy (SP). 2023. pp. 3026-3042. DOI: 10.1109/SP46215.2023.10179369
-
Quy V., Hau N., Anh D., Ngoc L. Smart healthcare IoT applications based on fog computing: architecture, applications and challenges. Complex & Intelligent Systems. 2022. vol. 8. pp. 3805-3815. DOI: 10.1007/s40747-021-00582-9 EDN: BHJSVI
-
Rejeb A., Rejeb K., Simske S., Treiblmaier H., Zailani S. The big picture on the internet of things and the smart city: a review of what we know and what we need to know. Internet of Things. 2022. vol. 19. DOI: 10.1016/j.iot.2022.100565
-
Inayat U., Zia M., Mahmood S., Khalid H., Benbouzid M. Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects. Electronics. 2022. vol. 11(9). DOI: 10.3390/electronics11091502
-
Hatami M., Leinonen M., Chen Z., Pappas N., Codreanu M. On-Demand AoI Minimization in Resource-Constrained Cache-Enabled IoT Networks With Energy Harvesting Sensors. IEEE Transactions on Communications. 2022. vol. 70. no. 11. pp. 7446-7463. DOI: 10.1109/TCOMM.2022.3208873 EDN: ZGUIRM
-
Nagaraju R, C V, J K, G M, Goyal SB, Verma C, Safirescu C, Mihaltan T. Secure Routing-Based Energy Optimization for IoT Application with Heterogeneous Wireless Sensor Networks. Energies. 2022. vol. 15(13). DOI: 10.3390/en15134777
-
Fotohi R., Bari S., Yusefi M. Securing Wireless Sensor Networks against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol. International Journal of Communication Systems. 2019. vol. 33(4). DOI: 10.1002/dac.4234
-
Yang S.-K., Shiue Y.-M., Su Z.-Y., Liu I.-H., Liu C.-G. An Authentication Information Exchange Scheme in WSN for IoT Applications. IEEE Access. 2020. vol. 8. pp. 9728-9738. DOI: 10.1109/ACCESS.2020.2964815
-
Ullah A., Said G., Sher M., Ning H. Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN. Peer-to-Peer Networking and Applications. 2020. vol. 13. pp. 163-174. DOI: 10.1007/s12083-019-00745-z EDN: XQUNNB
-
Singh D., Kumar B., Singh S., Chand S. A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC. International Journal of Healthcare Information Systems and Informatics. 2021. vol. 16. no. 2. pp. 21-48. DOI: 10.4018/IJHISI.20210401.oa2 EDN: MWLRSS
-
Ahmad A., Ullah A., Feng C., Khan M., Ashraf S., Adnan M., Nazir S., Ullah Khan H. Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications. Security and Communication Networks. 2020. vol. 2020. DOI: 10.1155/2020/8867792
-
Nada A., Bayoumi M. Development of a constraint stabilization method of multibody systems based on fuzzy logic control. Multibody System Dynamics. 2024. vol. 61. pp. 233-265. DOI: 10.1007/s11044-023-09921-9 EDN: DFKXJA
-
Liu L., Xue D., Zhang S. General type industrial temperature system control based on fuzzy fractional-order PID controller. Complex and Intelligent Systems. 2023. vol. 9. pp. 2585-2597. DOI: 10.1007/s40747-021-00431-9 EDN: XTMAPQ
-
Sivapriya N., Ravi T. Efficient Fuzzy based Multi-constraint Multicast Routing with Multi-criteria Enhanced Optimal Capacity-Delay Tradeoff. International Journal of Scientific & Technology Research. 2019. vol. 8(8). pp. 1468-1473.
-
Jasim A., Kashmar A. An Evaluation of RSA and a Modified SHA-3 for a New Design of Blockchain Technology. Artificial Intelligence for Smart Healthcare. EAI/Springer Innovations in Communication and Computing. Cham: Springer, 2023. pp. 477-489. DOI: 10.1007/978-3-031-23602-0_28
-
Abid R., Iwendi C., Javed A., Rizwan M., Jalil Z., Anajemba J., Biamba C. An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. Personal and Ubiquitous Computing. 2023. vol. 27. pp. 1405-1418. DOI: 10.1007/s00779-021-01607-3 EDN: GKNVMA
-
Anushiya R., Lavanya V. A new deep-learning with swarm based feature selection for intelligent intrusion detection for the Internet of things. Measurement: Sensors. 2023. vol. 26. DOI: 10.1016/j.measen.2023.100700
-
Roldan-Gomez J., Boubeta-Puig J., Carrillo-Mondejar J., Manuel Castelo Gomez J., del Rincon J. An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns. Engineering Applications of Artificial Intelligence. 2023. vol. 123. DOI: 10.1016/j.engappai.2023.106344
-
Size considerations for public and private keys. Available at: https://www.ibm.com/docs/en/zos/2.3.0?topic=certificates-size-considerations-public-private-keys (accessed 26.01.2024).
-
Visual Studio 2022. Available at: https://visualstudio.microsoft.com/vs/ (accessed 10.02.2024).
-
Features of C++ 20. Available at: https://www.geeksforgeeks.org/features-of-c-20/ (accessed 04.02.2024).
-
OPNET Network Simulator. Available at: https://opnetprojects.com/opnet-network-simulator/ (accessed 16.14.2024).