Hamid Barati

Orcid: 0000-0003-0028-3568

According to our database1, Hamid Barati authored at least 38 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An authentication mechanism based on blockchain for IoT environment.
Clust. Comput., December, 2024

A lightweight hierarchical method for improving security in the internet of things using fuzzy logic.
Concurr. Comput. Pract. Exp., March, 2024

L2AI: lightweight three-factor authentication and authorization in IOMT blockchain-based environment.
CoRR, 2024

2023
A dynamic and multi-level key management method in wireless sensor networks (WSNs).
Comput. Networks, November, 2023

Correction to: A distributed energy-efficient coverage holes detection and recovery method in wireless sensor networks using the grasshopper optimization algorithm.
J. Ambient Intell. Humaniz. Comput., October, 2023

A distributed energy-efficient coverage holes detection and recovery method in wireless sensor networks using the grasshopper optimization algorithm.
J. Ambient Intell. Humaniz. Comput., October, 2023

2022
A hierarchical key management method for wireless sensor networks.
Microprocess. Microsystems, April, 2022

An overlapping routing approach for sending data from things to the cloud inspired by fog technology in the large-scale IoT ecosystem.
Wirel. Networks, 2022

A hierarchical congestion control method in clustered internet of things.
J. Supercomput., 2022

A two-level clustering based on fuzzy logic and content-based routing method in the internet of things.
Peer-to-Peer Netw. Appl., 2022

A secure three-factor authentication scheme for IoT environments.
J. Parallel Distributed Comput., 2022

A cluster-based routing method with authentication capability in Vehicular Ad hoc Networks (VANETs).
J. Parallel Distributed Comput., 2022

HDRM: A hole detection and recovery method in wireless sensor network.
Int. J. Commun. Syst., 2022

A hierarchical key management and authentication method for wireless sensor networks.
Int. J. Commun. Syst., 2022

An Authentication-Based Secure Data Aggregation Method in Internet of Things.
J. Grid Comput., 2022

A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments.
Computing, 2022

An efficient gray system theory-based routing protocol for energy consumption management in the Internet of Things using fog and cloud computing.
Computing, 2022

2021
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks.
Peer-to-Peer Netw. Appl., 2021

Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks.
Peer-to-Peer Netw. Appl., 2021

A reliable tree-based data aggregation method in wireless sensor networks.
Peer-to-Peer Netw. Appl., 2021

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review.
J. Netw. Comput. Appl., 2021

SHSDA: secure hybrid structure data aggregation method in wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2021

A method for routing and data aggregating in cluster-based wireless sensor networks.
Int. J. Commun. Syst., 2021

A multi-level routing method in vehicular ad hoc networks using unnamed aerial vehicle nodes.
Int. J. Commun. Syst., 2021

Robust Image Watermarking in Wavelet Domain using GBT-DWT-SVD and Whale Optimization Algorithm.
CoRR, 2021

EELRP: energy efficient layered routing protocol in wireless sensor networks.
Computing, 2021

2020
DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks.
Wirel. Networks, 2020

A distributed energy-efficient approach for hole repair in wireless sensor networks.
Wirel. Networks, 2020

EGRPM: Energy efficient geographic routing protocol based on mobile sink in wireless sensor networks.
Sustain. Comput. Informatics Syst., 2020

3DEOR: an opportunity routing protocol using evidence theory appropriate for 3D urban environments in VANETs.
IET Commun., 2020

An energy-aware clustering and two-level routing method in wireless sensor networks.
Computing, 2020

2019
An efficient and secure RFID authentication protocol using elliptic curve cryptography.
Wirel. Networks, 2019

Distributed energy efficient algorithm for ensuring coverage of wireless sensor networks.
IET Commun., 2019

Dynamic key management algorithms in wireless sensor networks: A survey.
Comput. Commun., 2019

Security Improvement in Mobile Banking Using Hybrid Authentication.
Proceedings of the 3rd International Conference on Advances in Artificial Intelligence, 2019

2017
RMRPTS: a reliable multi-level routing protocol with tabu search in VANET.
Telecommun. Syst., 2017

2016
CGC: centralized genetic-based clustering protocol for wireless sensor networks using onion approach.
Telecommun. Syst., 2016

2015
EACHP: Energy Aware Clustering Hierarchy Protocol for Large Scale Wireless Sensor Networks.
Wirel. Pers. Commun., 2015


  Loading...