G. Mahalakshmi's research while affiliated with Government Engineering College and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publication (1)
Wireless sensor networks (WSNs) and Internet of Things (IoT) are essential for numerous applications. WSN nodes often operate on limited battery capacity, so energy efficiency is a significant problem for clustering and routing. In addition to these limitations, one of the primary issues of WSNs is achieving reliability and security of transmitted...
Citations
... The need for robust authentication mechanisms in IoT environments to counter de-authentication attacks and unauthorized access is addressed. SecureKey leverages blockchain's decentralized and tamper-resistant nature to establish a secure and trustless authentication process for IoT devices [21]. The framework employs smart contracts to enforce authentication rules and facilitate secure interactions between devices, ensuring the integrity of communication within the IoT ecosystem. ...