Zobrazeno 1 - 10
of 1 711
pro vyhledávání: '"Authentication scheme"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-12 (2024)
Abstract The Industrial Internet of Things (IIoT) is recognized as one of the revolutionary technologies driving smart manufacturing and improving productivity. As manufacturing processes grow increasingly intricate, the entire manufacturing ecosyste
Externí odkaz:
https://doaj.org/article/875b4733ebe44ee48988a819d7daf64d
Autor:
Pendukeni Phalaagae, Adamu Murtala Zungeru, Boyce Sigweni, Selvaraj Rajalakshmi, Herbet Batte, Odongo S. Eyobu
Publikováno v:
Scientific African, Vol 25, Iss , Pp e02287- (2024)
Wireless Internet of Things (IoT) sensor networks (WITSN) play a pivotal role in modern society, facilitating a myriad of applications ranging from smart homes to industrial automation. Therefore, safeguarding these networks against security threats
Externí odkaz:
https://doaj.org/article/57202099805a4adb8cc25019dcd93b62
Autor:
Salman Ali Syed, Selvakumar Manickam, Mueen Uddin, Hamed Alsufyani, Mohammad Shorfuzzaman, Shitharth Selvarajan, Gouse Baig Mohammed
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-20 (2024)
Abstract Internet of Things (IoT) paves the way for the modern smart industrial applications and cities. Trusted Authority acts as a sole control in monitoring and maintaining the communications between the IoT devices and the infrastructure. The com
Externí odkaz:
https://doaj.org/article/b97142b5b5ef43039fb3bf8ae74224c6
Autor:
Zeyad Ghaleb Al-Mekhlafi, Saima Anwar Lashari, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Abdulaziz M. Alayba, Ahmed M. Shamsan Saleh, Hamad A. Al-Reshidi, Khalil Almekhlafi
Publikováno v:
IEEE Access, Vol 12, Pp 141514-141527 (2024)
The functional characteristics of existing inter-vehicle communication networks are used to offer a certificateless authentication scheme that integrates fifth-generation (5G) communication and fog computing. Thus, CLA-FC5G, a novel certificateless a
Externí odkaz:
https://doaj.org/article/7d58d81320834b2caea387a5b9fb478e
Autor:
Zeyad Ghaleb Al-Mekhlafi, Hussam Dheaa Kamel Al-Janabi, Ayman Khalil, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Abeer Abdullah Alsadhan, Abdulaziz M. Alayba, Ahmed M. Shamsan Saleh, Hamad A. Al-Reshidi, Khalil Almekhlafi
Publikováno v:
IEEE Access, Vol 12, Pp 71232-71247 (2024)
Vehicular fog systems that are enabled by fifth-generation (5G) networks can significantly improve traffic safety and efficiency through vehicle-to-vehicle communication. Vehicles must have their legal status verified before they can join the network
Externí odkaz:
https://doaj.org/article/0c8111ea490346a19ebcd1479837f871
Autor:
Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Zeyad Ghaleb Al-Mekhlafi, Jalawi Sulaiman Alshudukhi, Kawther A. Al-Dhlan
Publikováno v:
IEEE Access, Vol 12, Pp 6251-6261 (2024)
The quick progress of 5G networks has allowed for intelligent driving. The primary environment for intelligent driving is provided by vehicular ad hoc networks (VANETs), which relay real-time data and communications between moving vehicles and fixed
Externí odkaz:
https://doaj.org/article/4a20c044ffb643b68c3f1b1304e16de3
Publikováno v:
Proceedings on Engineering Sciences, Vol 5, Iss 3, Pp 399-416 (2023)
This article focuses on software methods for detecting and preventing the introduction of hardware trojans into the topology of integrated circuits at the design stage. An additional recommendation for typical procedures of receiving GDSII files that
Externí odkaz:
https://doaj.org/article/a2ff38a0f51641b895524092fb889d2c
Publikováno v:
Measurement: Sensors, Vol 30, Iss , Pp 100929- (2023)
Recently, healthcare monitoring systems have emerged as significant tolls for constant monitoring of patient's physiological characteristics. These systems use implanted sensors. IoT (Internet of Things) have revolutionized healthcare systems where h
Externí odkaz:
https://doaj.org/article/5b8bc173e2934143ace713ae06720367
Publikováno v:
Satellite Navigation, Vol 4, Iss 1, Pp 1-18 (2023)
Abstract Civilian services of Global Navigation Satellite System are threatened by spoofing attacks since it is hard to determine the authenticity of a navigation signal with a detailed structure open to the public. Signal authentication effectively
Externí odkaz:
https://doaj.org/article/999c36f8255145a394169ad4a7e01dd2
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.