Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …
[HTML][HTML] Security and privacy in big data life cycle: a survey and open challenges
The use of big data in various fields has led to a rapid increase in a wide variety of data
resources, and various data analysis technologies such as standardized data mining and …
resources, and various data analysis technologies such as standardized data mining and …
An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks
In wireless sensor networks (WSNs), security, efficiency, and energy consumption are still
major challenges due to its open, large-scale, and resource-constrained nature. The …
major challenges due to its open, large-scale, and resource-constrained nature. The …
[HTML][HTML] An architecture for managing data privacy in healthcare with blockchain
AG de Moraes Rossetto, C Sega, VRQ Leithardt - Sensors, 2022 - mdpi.com
With the fast development of blockchain technology in the latest years, its application in
scenarios that require privacy, such as health area, have become encouraged and widely …
scenarios that require privacy, such as health area, have become encouraged and widely …
[HTML][HTML] PADRES: tool for privacy, data regulation and security
F Pereira, P Crocker, VRQ Leithardt - SoftwareX, 2022 - Elsevier
Since May 2018, companies have been required to comply with the General Data Protection
Regulation (GDPR). The compliance process can be very expensive, for example …
Regulation (GDPR). The compliance process can be very expensive, for example …
Comparative performance analysis of lightweight cryptography algorithms for IoT sensor nodes
The Internet of Things (IoT) has become an integral part of future solutions, ranging from
industrial to everyday human life applications. Adding a new level of intelligence to objects …
industrial to everyday human life applications. Adding a new level of intelligence to objects …
[HTML][HTML] Enhancements and challenges in coap—a survey
The Internet of Engineering Task (IETF) developed a lighter application protocol
(Constrained Application Protocol (CoAP)) for the constrained IoT devices operating in lossy …
(Constrained Application Protocol (CoAP)) for the constrained IoT devices operating in lossy …
[HTML][HTML] On general data protection regulation vulnerabilities and privacy issues, for wearable devices and fitness tracking applications
I Ioannidou, N Sklavos - Cryptography, 2021 - mdpi.com
Individual users' sensitive information, such as heart rate, calories burned, or even sleep
patterns, are casually tracked by smart wearable devices to be further processed or …
patterns, are casually tracked by smart wearable devices to be further processed or …
[HTML][HTML] ChaCha20–Poly1305 authenticated encryption with additional data for transport layer security 1.3
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in
computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3 …
computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3 …
[HTML][HTML] Improved secure encryption with energy optimization using random permutation pseudo algorithm based on internet of thing in wireless sensor networks
The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this
expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low …
expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low …