Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment Sanjeev Kumar DwivediRuhul AminSatyanarayana Vollala Review Article 17 September 2022 Pages: 1 - 21
Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization Srivel RaviSaravanan MatheswaranSrinivas Kumar Palvadi OriginalPaper 19 September 2022 Pages: 22 - 34
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things Diksha RangwaniHari Om OriginalPaper 20 September 2022 Pages: 35 - 56
Traffic simulation and losses estimation in stratospheric drone network Volodymyr KharchenkoAndrii Grekhov OriginalPaper 21 September 2022 Pages: 57 - 70
Minimization of VANET execution time based on joint task offloading and resource allocation Neng WanYating LuoXianwei Zhou OriginalPaper 23 September 2022 Pages: 71 - 86
EEM-MAC: Enhanced energy efficient mobility aware MAC protocol for mobile internet of things V. C. DinieshG. Murugesan OriginalPaper 23 September 2022 Pages: 87 - 106
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain Xiaohui YangWenjie LiKai Fan OriginalPaper 23 September 2022 Pages: 107 - 125
Field-clustering with sleep awake mechanism with fuzzy in wireless sensor network Poonam TiwariSandeep Kumar GuptaAruna Pathak OriginalPaper 23 September 2022 Pages: 126 - 141
A blockchain-based framework for privacy-preserving and verifiable billing in smart grid Meng ZhaoYong DingHuiyong Wang OriginalPaper 26 September 2022 Pages: 142 - 155
TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage Mu HanPuyi XuChungen Xu OriginalPaper 27 September 2022 Pages: 156 - 169
Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things Lixia LinWen’an ZhouJianlong Liu OriginalPaper 29 September 2022 Pages: 170 - 188
CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic Milad MohseniFatemeh AmirghafouriBehrouz Pourghebleh OriginalPaper 03 October 2022 Pages: 189 - 209
An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks S. KranthiM. KanchanaM. Suneetha OriginalPaper 04 October 2022 Pages: 210 - 225
MANDALA: A scalable blockchain model with mesh-and-spoke network and H-PBFT consensus algorithm Jinze LiXiaofeng LiNianzu Sheng OriginalPaper 04 October 2022 Pages: 226 - 244
A blockchain assisted multi-gateway authentication scheme for IIoT based on group Xin LiuMiao WangRuisheng Zhang OriginalPaper 09 October 2022 Pages: 245 - 259
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem Gaurav TyagiRahul Kumar OriginalPaper 17 October 2022 Pages: 260 - 276
Efficient content transmission algorithm based on multi-community and edge-caching in ICN-SIoT Zhaoqi CaiJia Wu OriginalPaper 28 October 2022 Pages: 277 - 294
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving Yanfei WangKai ZhangMi Wen OriginalPaper 04 November 2022 Pages: 295 - 311
Blockchain-Based Fair Payment for ABE with Outsourced Decryption Linjian HongKai ZhangHaifeng Qian OriginalPaper 04 November 2022 Pages: 312 - 327
Blockchain-based system for tracking and rewarding recyclable plastic waste Eiman AlnuaimiMariam AlsafiRaja Jayaraman OriginalPaper 17 November 2022 Pages: 328 - 346
MPPT-EPO optimized solar energy harvesting for maximizing the WSN lifetime Preeti GuptaSachin TripathiV. S. Gupta OriginalPaper 23 November 2022 Pages: 347 - 357
Privacy-preserving and fault-tolerant aggregation of time-series data without TA Chang XuRun YinKashif Sharif OriginalPaper 25 November 2022 Pages: 358 - 367
Effective communication for message prioritization in DTN for disaster scenarios Erika RosasOrlando AndradeNicolás Hidalgo OriginalPaper 01 December 2022 Pages: 368 - 382
An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords Ming LuoDashi HuangMinrong Qiu OriginalPaper 01 December 2022 Pages: 383 - 394
Supporting conflict-free replicated data types in opportunistic networks Frédéric GuidecYves MahéoCamille Noûs OriginalPaper 03 December 2022 Pages: 395 - 419
Practical Byzantine fault tolerance consensus based on comprehensive reputation Jiamou QiYepeng Guan ReviewPaper 06 December 2022 Pages: 420 - 430
Tamper-proof multitenant data storage using blockchain Aditi SharmaParmeet Kaur OriginalPaper 13 December 2022 Pages: 431 - 449
An efficient route selection mechanism based on network topology in battery-powered internet of things networks Tania TaamiSadoon AziziRamin Yarinezhad OriginalPaper 13 December 2022 Pages: 450 - 465
Backdoor attacks against deep reinforcement learning based traffic signal control systems Heng ZhangJun GuHongran Li OriginalPaper 14 December 2022 Pages: 466 - 474