• Publications
  • Influence
H-LEACH: Hybrid-low energy adaptive clustering hierarchy for wireless sensor networks
TLDR
This paper discusses about H-LEACH, which is used to solve problems of energy considerations while electing a channel head. Expand
  • 40
  • 4
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment
TLDR
We propose a novel triangular data privacy-preserving (TDPP) model that supports public auditing with the capability of auditing all the key stakeholders (i.e., CSU, TPA, and CSP) for achieving optimal security in a cloud environment. Expand
  • 22
  • 2
Cloud Data Integrity Using a Designated Public Verifier
TLDR
We present a new data security scheme which allows a CSU to enable a public verifier (e.g., a third-party auditor) to perform the necessary auditing tasks at the cloud data. Expand
  • 17
  • 2
Low Duty Cycle, Energy-Efficient and Mobility-Based Boarder Node—MAC Hybrid Protocol for Wireless Sensor Networks
TLDR
In this paper, a low duty cycle, energy-efficient and mobility-based Boarder Node Medium Access Control (BN-MAC) hybrid protocol is introduced for WSNs that controls overhearing, idle listening and congestion issues. Expand
  • 22
  • 2
  • PDF
Secure data aggregation using access control and authentication for wireless sensor networks
TLDR
We introduce the secure data aggregation using the access control and authentication (SDAACA) protocol. Expand
  • 14
  • 2
Chatbot: Efficient and Utility-Based Platform
TLDR
This paper aims to analyze the technology of chatbots and investigate its development, which is becoming a popular trend now. Expand
  • 5
  • 2
Task scheduling in Cloud computing
TLDR
In this paper, we introduce an efficient task-scheduling algorithm, which presents divisible task scheduling by considering network bandwidth. Expand
  • 77
  • 1
P-LEACH: Energy efficient routing protocol for Wireless Sensor Networks
TLDR
We introduce P-LEACH, a near optimal cluster-based chain protocol that is an improvement over PEGASIS and LEACH both for reducing energy consumption in the network. Expand
  • 53
  • 1
Deep recurrent neural network for IoT intrusion detection system
TLDR
We presented an artificially full-automated intrusion detection system for Fog computing security against cyber-attacks. Expand
  • 20
  • 1
Privacy preserving model: a new scheme for auditing cloud stakeholders
TLDR
We propose the privacy-preserving model (PPM) to audit all the stakeholders in order to provide a relatively secure cloud computing environment. Expand
  • 22
  • 1
...
1
2
3
4
5
...