共 45 条
[1]
Ahmed MTA, Hashim F, Hashim SJ, Abdullah A., Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks, Electronics, 12, 4, (2023)
[2]
Al-Shareeda MA, Manickam S, Laghari SA, Jaisan A., Replay-attack detection and prevention mechanism in industry 4.0 landscape for secure SECS/GEM communications, Sustainability, 14, 23, (2022)
[3]
Alsultan M, Oztoprak K, Hassanpour R., Power aware routing protocols in wireless sensor network, IEICE Transactions on Communications, E99.B, 7, pp. 1481-1491, (2016)
[4]
Bilami KE, Lorenz P., Lightweight blockchain-based scheme to secure wireless M2M area networks, Future Internet, 14, 5, (2022)
[5]
Butun I, Tuncel YK, Oztoprak K., Application layer packet processing using PISA switches, Sensors, 21, 23, (2021)
[6]
Choudhary D, Pahuja R., A blockchain-based cyber-security for connected networks, Peer-To-Peer Networking and Applications, 16, pp. 1852-1867, (2023)
[7]
Dehalwar V, Kolhe ML, Deoli S, Jhariya MK., Blockchain-based trust management and authentication of devices in smart grid, Cleaner Engineering and Technology, 8, (2022)
[8]
Djehaiche R, Aidel S, Sawalmeh A, Saeed N, Alenezi AH., Adaptive control of IoT/M2M devices in smart buildings using heterogeneous wireless networks, IEEE Sensors Journal, 23, 7, pp. 7836-7849, (2023)
[9]
Ejigu MW, Santhosh J., IoT based comprehensive autonomous home automation and security system using M2M communication, Recent Advances in Computer Science and Communications, 14, 7, pp. 2234-2246, (2020)
[10]
Fatani A, Elaziz MA, Dahou A, Al-Qaness MAA, Lu S., IoT intrusion detection system using deep learning and enhanced transient search optimization, IEEE Access, 9, pp. 123448-123464, (2021)