Secure Communication in Wireless Sensor Networks Using Cuckoo Hash-Based Multi-Factor Authentication
Abstract: As WSNs face factors such as unauthorized access, resource constraints and ever-changing threats, WSNs need enhanced security models. This study presents the Cuckoo Hash-Based Multi-Factor ...
Abstract: The impact of the IoT’s growing influence is increasing daily in every area. Every year, billions of phones are connected to this network, which is expanding the IoT network. Radio Frequency ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results