Security comes first, a public-key cryptography framework for the internet of things

H Shafagh, A Hithnawi - … Computing in Sensor Systems, 2014 - ieeexplore.ieee.org
secure E2E communication with constrained environments involving Public-key Cryptography
… , compact certificates and hardware acceleration engines for crypto. Moreover, we aim at …

[HTML][HTML] An analysis of cybersecurity attacks against internet of things and security solutions

MR Islam, KM Aktheruzzaman - Journal of Computer and …, 2020 - scirp.org
… these security challenges, we need to come with security solutions that use low overhead
protocols and inexpensive computational algorithms and can provide strong encryption and …

[HTML][HTML] Security trends in Internet of Things: A survey

Rachit, S Bhatt, PR Ragiri - SN Applied Sciences, 2021 - Springer
… The primary purpose of this research work is to explore the latest security solutions in the IoT…
security solutions are addressed by using existing encryption techniques and novel security

Hybrid optimization with cryptography encryption for medical image security in Internet of Things

M Elhoseny, K Shankar, SK Lakshmanaprabu… - Neural computing and …, 2020 - Springer
security systems are also using encryption or steganography, or their mixes. There is distinctive
securable and perfect course of action of image encryption … require anchored answers for …

A review of security in internet of things

Y Harbi, Z Aliouat, S Harous, A Bentaleb… - Wireless Personal …, 2019 - Springer
… In addition, we describe various recent security solutions and classify them based on their …
cryptographic algorithms. The work in [55] described some cloud-based solutions that secure

[图书][B] Wireless Communications Security: Solutions for the Internet of Things

JTJ Penttinen - 2016 - books.google.com
solutions and challenges of wireless security by summarizing typical, currently utilized services
and solutions… of the chip during a cryptographic operation which may give hints about the …

Security Challenges in the IP-based Internet of Things

T Heer, O Garcia-Morchon, R Hummen… - Wireless Personal …, 2011 - Springer
… These security services can be implemented by means of different cryptographic … as
general-purpose key exchange and security solutions exist for the Internet domain, we focus on the …

Challenges of securing Internet of Things devices: A survey

MG Samaila, M Neto, DAB Fernandes… - Security and …, 2018 - Wiley Online Library
… for solutions based on cryptographic primitives; solutions based on … proposals on security
middlewares and secure solutions for … The authors observed that IoT services can only gain the …

Cryptographic system for data applications, in the context of internet of things

P Panagiotou, N Sklavos, E Darra… - Microprocessors and …, 2020 - Elsevier
cryptographic system, specialized for data applications of IoT. It integrates alternative
cryptographic and security services… is to influence on the privacy systems, that are beneficial to …

Securing the Internet of Things in a quantum world

C Cheng, R Lu, A Petzoldt… - IEEE Communications …, 2017 - ieeexplore.ieee.org
… future security solutions for the IoT. … security of the cryptographic schemes used today, and
then give an overview of the recommendations for cryptographic schemes that can be secure