On perspective of security and privacy-preserving solutions in the internet of things

L Malina, J Hajny, R Fujdiak, J Hosek - Computer Networks, 2016 - Elsevier
Abstract The Internet of Things (IoT) brings together a large variety of devices of different
platforms, computational capacities and functionalities. The network heterogeneity and the …

Towards efficient fine-grained access control and trustworthy data processing for remote monitoring services in IoT

Y Chen, W Sun, N Zhang, Q Zheng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As an important application of the Internet of Things, many remote monitoring systems adopt
a device-to-cloud network paradigm. In a remote patient monitoring case, various resource …

Lightweight cryptographic protocols for IoT-constrained devices: A survey

MN Khan, A Rao, S Camtepe - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …

Internet of things security: challenges and key issues

M Azrour, J Mabrouki, A Guezzaz… - Security and …, 2021 - Wiley Online Library
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …

[PDF][PDF] Lightweight cryptography for the internet of things

M Katagi, S Moriai - sony corporation, 2008 - Citeseer
Lightweight Cryptography for the Internet of Things Page 1 Lightweight Cryptography for the
Internet of Things Masanobu Katagi and Shiho Moriai Sony Corporation Abstract. This paper …

Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

Secure IoT framework and 2D architecture for End-To-End security

J Choi, Y In, C Park, S Seok, H Seo, H Kim - The Journal of …, 2018 - Springer
In this paper, we proposed an secure IoT framework to ensure an End-To-End security from
an IoT application to IoT devices. The proposed IoT framework consists of the IoT …

Cryptographic technologies and protocol standards for Internet of Things

S Zeadally, AK Das, N Sklavos - Internet of Things, 2021 - Elsevier
Abstract The Internet of Things (IoT) comprises physical/virtual networked objects that collect
and exchange data with each other via the public Internet. As this exchange often takes …

Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities

VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …

SIT: a lightweight encryption algorithm for secure internet of things

M Usman, I Ahmed, MI Aslam, S Khan… - arXiv preprint arXiv …, 2017 - arxiv.org
The Internet of Things (IoT) being a promising technology of the future is expected to
connect billions of devices. The increased number of communication is expected to …