© 2019, Springer Nature Switzerland AG. The IoT development area has drawn the attention of nowadays researchers, some of them made assumptions regarding the use of clustering in their key management schemes. For example, in CL-EKM (Certificateless Effective Key Management) protocol, cluster-heads are assumed to be with high-processing capabilities and deployed within a grid topology. In fact, this is only possible in a controlled environment. In a hostile environment, such as battlefields, this assumption cannot be satisfied. In this work, an enhancement of the CL-EKM scheme has been proposed by introducing a distributed clustering algorithm. The performance of the implemented and enhanced system proved our assumptions
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
© 2019 Association for Computing Machinery. The insecurity of the Internet-of-Things (IoT) paradigm ...
© 2017 IEEE. This paper discusses the problem of collusion attacks in Internet of Things (IoT) envir...
© 2019, Springer Nature Switzerland AG. The IoT development area has drawn the attention of nowadays...
© 2016 ACM. We propose in this paper to handle the problem of overload in social interactions by gro...
Network infrastructure improvements (within or peripheral to the Internet) for nomadic computer-base...
Scalability and security problems with centralized architecture models in cyberphysical systems have...
High dimensional data are difficult to view in two-dimensional plot. However, having a mechanism to ...
© 1970-2012 IEEE. Blockchain and fog computing are being evaluated as potential support for software...
© 2018 ACM. In the era of smart devices, the reliance of intelligence is the abundance of data. This...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
In a panel session on Data, Platforms, and Policies, participants examined the state of artificial i...
The immense improvements in the latest internet inventions encouraged the adaptation of technology w...
The Internet of Things (IoT), which has accelerated the digital transformation technology revolution...
© 2020, Springer Science+Business Media, LLC, part of Springer Nature. In the context of an Internet...
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
© 2019 Association for Computing Machinery. The insecurity of the Internet-of-Things (IoT) paradigm ...
© 2017 IEEE. This paper discusses the problem of collusion attacks in Internet of Things (IoT) envir...
© 2019, Springer Nature Switzerland AG. The IoT development area has drawn the attention of nowadays...
© 2016 ACM. We propose in this paper to handle the problem of overload in social interactions by gro...
Network infrastructure improvements (within or peripheral to the Internet) for nomadic computer-base...
Scalability and security problems with centralized architecture models in cyberphysical systems have...
High dimensional data are difficult to view in two-dimensional plot. However, having a mechanism to ...
© 1970-2012 IEEE. Blockchain and fog computing are being evaluated as potential support for software...
© 2018 ACM. In the era of smart devices, the reliance of intelligence is the abundance of data. This...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
In a panel session on Data, Platforms, and Policies, participants examined the state of artificial i...
The immense improvements in the latest internet inventions encouraged the adaptation of technology w...
The Internet of Things (IoT), which has accelerated the digital transformation technology revolution...
© 2020, Springer Science+Business Media, LLC, part of Springer Nature. In the context of an Internet...
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
© 2019 Association for Computing Machinery. The insecurity of the Internet-of-Things (IoT) paradigm ...
© 2017 IEEE. This paper discusses the problem of collusion attacks in Internet of Things (IoT) envir...