A distributed security mechanism for resource-constrained IoT devices
J King, AI Awad - Informatica, 2016 - informatica.si
Abstract Internet of Things (IoT) devices have grown up to comprise embedded systems and
sensors with the ability to connect, collect, and transmit data over the Internet. Although …
sensors with the ability to connect, collect, and transmit data over the Internet. Although …
Secure lightweight cryptosystem for IoT and pervasive computing
M Abutaha, B Atawneh, L Hammouri, G Kaddoum - Scientific Reports, 2022 - nature.com
Large volumes of sensitive data are being transferred among devices as the Internet of
Things (IoT) grows in popularity. As a result, security measures must be implemented to …
Things (IoT) grows in popularity. As a result, security measures must be implemented to …
{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}
As the Internet of Things (IoT) emerges over the next decade, developing secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives
MR Alagheband, A Mashatan - The Journal of Supercomputing, 2022 - Springer
Abstract The Internet of Things (IoT) is increasingly becoming widespread in different areas
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …
Reconfigurable security: Edge-computing-based framework for IoT
In various scenarios, achieving security between IoT devices is challenging since the
devices may have different dedicated communication standards and resource constraints as …
devices may have different dedicated communication standards and resource constraints as …
Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device
B Tsao, Y Liu, B Dezfouli - Proceedings of the 16th EAI International …, 2019 - dl.acm.org
With the proliferation of IoT, securing the abundance of devices is critical. The current IoT
and security landscapes lack empirical evidence on algorithms optimized for constrained …
and security landscapes lack empirical evidence on algorithms optimized for constrained …
Scalable and efficient hardware architectures for authenticated encryption in IoT applications
Internet of Things (IoT) is a key enabling technology, wherein sensors are placed
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …
An efficient lightweight cryptographic algorithm for IoT security
To perform various tasks, different devices are interconnected and interact in several
emerging areas. The emergence of the Internet of Things (IoT) and its applications makes it …
emerging areas. The emergence of the Internet of Things (IoT) and its applications makes it …
Secure and lightweight encryption model for IoT surveillance camera
M Abbas Fadhil Al-Husainy… - International Journal of …, 2020 - papers.ssrn.com
We are witnessing the era of Internet of Things (IoT), where its applications such as smart
cities and smart homes catch sensitive data gathered mostly by IoT surveillance cameras …
cities and smart homes catch sensitive data gathered mostly by IoT surveillance cameras …
Low-cost standard public key cryptography services for wireless iot systems
Internet of Things (IoT) is an integral part of application domains such as smart-home and
digital healthcare. Various standard public key cryptography techniques (eg, key exchange …
digital healthcare. Various standard public key cryptography techniques (eg, key exchange …