INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIV, Issue X, October 2025
67. Cao, Q., Jin, B., Zhou, P., Chen, W., & Cao, B. (2024). CECEHO-GCS: A new green energy-efficient clustering protocol
based on intelligent optimization theory in Industrial IoT. IEEE Internet of Things Journal.
68. Priyadarshi, R. (2024). Energy-efficient routing in wireless sensor networks: A metaheuristic and artificial intelligence-
based approach—a comprehensive review. Archives of Computational Methods in Engineering. Springer.
69. Chen, Y., Hao, S., & Nazif, H. (2021). A privacy-aware approach for managing the energy of cloud-based IoT resources
using an improved optimization algorithm. IEEE Internet of Things Journal.
70. Cao, J., Zhang, D., Zhou, H., & Wan, P. (2019). Energy-aware privacy-preserving data transmission in IoT-dense networks.
IEEE Internet of Things Journal.
71. Arpitha, T., Chouhan, D., & Shreyas, J. (2024). Hybrid routing techniques for location privacy in IoT-enabled wireless
sensor healthcare networks. SN Computer Science. Springer.
72. Zhao, B., Li, X., Liu, X., Pei, Q., & Li, Y. (2023). CrowdFA: A privacy-preserving mobile crowdsensing paradigm via
federated analytics. IEEE Transactions on Mobile Computing.
73. Farrea, K. A., Baig, Z., Doss, R. R. M., & Liu, D. (2024). Provably secure optimal homomorphic signcryption for satellite-
based Internet of Things. Computer Networks. Elsevier.
74. Marchang, N. (2024). A federated learning privacy framework for environmental data processing. Wiley.
75. Cao, S., Liu, S., Yang, Y., Du, W., Zhan, Z., Wang, D., & Zhang, W. (2025). A hybrid and efficient federated learning for
privacy preservation in IoT devices. Ad Hoc Networks. Elsevier.
76. Agarwal, G., Sanghi, A., & Falade, A. (2024). End-to-end security and privacy for multi-cloud environments. In Proc. AIP
Conference Proceedings.
77. Trakadas, P., Nomikos, N., Michailidis, E., & Zahariadis, T. (2019). Hybrid clouds for data-intensive, 5G-enabled IoT
applications: An overview, key issues, and relevant architecture. Sensors. MDPI.
78. Michailidis, P. (2024). Adaptive optimization of intelligent agents in IoT security. Didaktorika.
79. Tatipatri, N., & Arun, S. L. (2024). A comprehensive review on cyberattacks in power systems: Impact analysis, detection,
and cybersecurity. IEEE Access.
80. Alhakami, H. (2024). Enhancing IoT security: Quantum-level resilience against threats. Computers, Materials & Continua.
TechScience.
81. Alotaibi, N. D., Alsaadi, M. S., & Ali, W. A. (2024). Advanced IoT technology and protocols: Review and future
perspectives. ResearchGate preprint.
82. Alyami, M., Zou, C., & Solihin, Y. (2024). Adaptive segmentation: A tradeoff between packet-size obfuscation and
performance. IEEE.
83. Sánchez, L., Minerva, R., & Lee, G. M. (2020). IoTRec: The IoT recommender for smart parking systems. IEEE
Transactions on Emerging Topics in Computing, 8(2), 429–440.
84. Hossain, M. M., & Hasan, R. (2017). Boot-IoT: A privacy-aware authentication scheme for secure bootstrapping of IoT
nodes. In Proc. IEEE International Congress on Internet of Things.
85. Razaque, A., Amsaad, F., & Abdulgader, M. (2022). A mobility-aware human-centric cyber–physical system for efficient
and secure smart healthcare. IEEE Internet of Things Journal.
86. Fouda, M. M., Fadlullah, Z. M., & Ibrahem, M. I. (2024). Privacy-preserving data-driven learning models for emerging
communication networks: A comprehensive survey. IEEE Communications Surveys & Tutorials.
87. Nguyen, T. H., Herbert, V., & Carpov, S. (2019). On the design of a privacy-preserving collaborative platform for
cybersecurity. In International Conference on Computer Safety, Reliability, and Security. Springer.
88. Wei, D., Xi, N., Ma, J., & Li, J. (2021). Protecting your offloading preference: Privacy-aware online computation
offloading in mobile blockchain. In Proc. IEEE/ACM International Symposium.
89. Tsaousoglou, G., Steriotis, K., & Kontogiorgos, D. (2020). Truthful, practical, and privacy-aware demand response in the
smart grid via a distributed and optimal mechanism. IEEE Transactions on Smart Grid.
90. Lombardi, F., & Di Pietro, R. (2011). Secure virtualization for cloud computing. Journal of Network and Computer
Applications, 34(4), 1113–1122.
91. Zhang, H., Chen, J., & Wang, Y. (2021). Adaptive privacy-preserving routing for secure cloud-based IoT networks. IEEE
Transactions on Cloud Computing, 9(3), 512–526.
92. Hassan, M., Rahman, A. M., & Li, C. (2022). Privacy-aware adaptive security mechanisms in cloud computing: A survey.
IEEE Access, 10, 89123–89140.
93. Bastos, D., Costa, N., & Rocha, N. P. (2024). A comprehensive survey on the societal aspects of smart cities. Applied
Sciences, 14(17), 7823.
94. da Silva, M., Viterbo, J., & Bernardini, F. (2018). Identifying privacy functional requirements for crowdsourcing
applications in smart cities. In Proc. 2018 IEEE International Conference on Smart Cities.
95. Jabbar, R., Kharbeche, M., Al-Khalifa, K., & Krichen, M. (2020). Blockchain for the Internet of Vehicles: A decentralized
IoT solution for vehicle communication using Ethereum. Sensors, 20(14), 3928.
96. Villalba, L. J. G., Orozco, A. L. S., Cabrera, A. T., & Abbas, C. J. B. (2009). Routing protocols in wireless sensor networks.
Sensors, 9(11), 8399–8421.
97. Singh, S. K., & Gupta, D. (2020). Security-aware routing protocols for wireless sensor networks: A comprehensive review.
IEEE Access, 8, 167789–167814.
Page 1342