Hamid Barati

Orcid: 0000-0003-0028-3568

According to our database1, Hamid Barati authored at least 43 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A secure and energy-efficient architecture in Internet of Things-cloud computing network by enhancing and combining three cryptographic techniques via defining new features, areas, and entities.
J. Supercomput., June, 2025

A lightweight authentication and authorization method in IoT-based medical care.
Multim. Tools Appl., April, 2025

A dynamic trust based clustering method for secure data gathering in Internet of Things.
Computing, April, 2025

EBIDS: efficient BERT-based intrusion detection system in the network and application layers of IoT.
Clust. Comput., April, 2025

HDAMM: Hierarchical Geographical Data Aggregation Method Using Mobile Sink in Wireless Sensor Networks.
Concurr. Comput. Pract. Exp., 2025

2024
An authentication mechanism based on blockchain for IoT environment.
Clust. Comput., December, 2024

A lightweight hierarchical method for improving security in the internet of things using fuzzy logic.
Concurr. Comput. Pract. Exp., March, 2024

L2AI: lightweight three-factor authentication and authorization in IOMT blockchain-based environment.
CoRR, 2024

2023
A dynamic and multi-level key management method in wireless sensor networks (WSNs).
Comput. Networks, November, 2023

Correction to: A distributed energy-efficient coverage holes detection and recovery method in wireless sensor networks using the grasshopper optimization algorithm.
J. Ambient Intell. Humaniz. Comput., October, 2023

A distributed energy-efficient coverage holes detection and recovery method in wireless sensor networks using the grasshopper optimization algorithm.
J. Ambient Intell. Humaniz. Comput., October, 2023

2022
A hierarchical key management method for wireless sensor networks.
Microprocess. Microsystems, April, 2022

An overlapping routing approach for sending data from things to the cloud inspired by fog technology in the large-scale IoT ecosystem.
Wirel. Networks, 2022

A hierarchical congestion control method in clustered internet of things.
J. Supercomput., 2022

A two-level clustering based on fuzzy logic and content-based routing method in the internet of things.
Peer-to-Peer Netw. Appl., 2022

A secure three-factor authentication scheme for IoT environments.
J. Parallel Distributed Comput., 2022

A cluster-based routing method with authentication capability in Vehicular Ad hoc Networks (VANETs).
J. Parallel Distributed Comput., 2022

HDRM: A hole detection and recovery method in wireless sensor network.
Int. J. Commun. Syst., 2022

A hierarchical key management and authentication method for wireless sensor networks.
Int. J. Commun. Syst., 2022

An Authentication-Based Secure Data Aggregation Method in Internet of Things.
J. Grid Comput., 2022

A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments.
Computing, 2022

An efficient gray system theory-based routing protocol for energy consumption management in the Internet of Things using fog and cloud computing.
Computing, 2022

2021
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks.
Peer-to-Peer Netw. Appl., 2021

Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks.
Peer-to-Peer Netw. Appl., 2021

A reliable tree-based data aggregation method in wireless sensor networks.
Peer-to-Peer Netw. Appl., 2021

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review.
J. Netw. Comput. Appl., 2021

SHSDA: secure hybrid structure data aggregation method in wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2021

A method for routing and data aggregating in cluster-based wireless sensor networks.
Int. J. Commun. Syst., 2021

A multi-level routing method in vehicular ad hoc networks using unnamed aerial vehicle nodes.
Int. J. Commun. Syst., 2021

Robust Image Watermarking in Wavelet Domain using GBT-DWT-SVD and Whale Optimization Algorithm.
CoRR, 2021

EELRP: energy efficient layered routing protocol in wireless sensor networks.
Computing, 2021

2020
DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks.
Wirel. Networks, 2020

A distributed energy-efficient approach for hole repair in wireless sensor networks.
Wirel. Networks, 2020

EGRPM: Energy efficient geographic routing protocol based on mobile sink in wireless sensor networks.
Sustain. Comput. Informatics Syst., 2020

3DEOR: an opportunity routing protocol using evidence theory appropriate for 3D urban environments in VANETs.
IET Commun., 2020

An energy-aware clustering and two-level routing method in wireless sensor networks.
Computing, 2020

2019
An efficient and secure RFID authentication protocol using elliptic curve cryptography.
Wirel. Networks, 2019

Distributed energy efficient algorithm for ensuring coverage of wireless sensor networks.
IET Commun., 2019

Dynamic key management algorithms in wireless sensor networks: A survey.
Comput. Commun., 2019

Security Improvement in Mobile Banking Using Hybrid Authentication.
Proceedings of the 3rd International Conference on Advances in Artificial Intelligence, 2019

2017
RMRPTS: a reliable multi-level routing protocol with tabu search in VANET.
Telecommun. Syst., 2017

2016
CGC: centralized genetic-based clustering protocol for wireless sensor networks using onion approach.
Telecommun. Syst., 2016

2015
EACHP: Energy Aware Clustering Hierarchy Protocol for Large Scale Wireless Sensor Networks.
Wirel. Pers. Commun., 2015


  Loading...