Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey

S Zaman, K Alhazmi, MA Aseeri, MR Ahmed… - Ieee …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …

[HTML][HTML] Security and privacy in big data life cycle: a survey and open challenges

J Koo, G Kang, YG Kim - Sustainability, 2020 - mdpi.com
The use of big data in various fields has led to a rapid increase in a wide variety of data
resources, and various data analysis technologies such as standardized data mining and …

An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks

OA Khashan, R Ahmad, NM Khafajah - Ad Hoc Networks, 2021 - Elsevier
In wireless sensor networks (WSNs), security, efficiency, and energy consumption are still
major challenges due to its open, large-scale, and resource-constrained nature. The …

[HTML][HTML] An architecture for managing data privacy in healthcare with blockchain

AG de Moraes Rossetto, C Sega, VRQ Leithardt - Sensors, 2022 - mdpi.com
With the fast development of blockchain technology in the latest years, its application in
scenarios that require privacy, such as health area, have become encouraged and widely …

[HTML][HTML] PADRES: tool for privacy, data regulation and security

F Pereira, P Crocker, VRQ Leithardt - SoftwareX, 2022 - Elsevier
Since May 2018, companies have been required to comply with the General Data Protection
Regulation (GDPR). The compliance process can be very expensive, for example …

Comparative performance analysis of lightweight cryptography algorithms for IoT sensor nodes

A Fotovvat, GME Rahman, SS Vedaei… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) has become an integral part of future solutions, ranging from
industrial to everyday human life applications. Adding a new level of intelligence to objects …

[HTML][HTML] Enhancements and challenges in coap—a survey

MA Tariq, M Khan, MT Raza Khan, D Kim - Sensors, 2020 - mdpi.com
The Internet of Engineering Task (IETF) developed a lighter application protocol
(Constrained Application Protocol (CoAP)) for the constrained IoT devices operating in lossy …

[HTML][HTML] On general data protection regulation vulnerabilities and privacy issues, for wearable devices and fitness tracking applications

I Ioannidou, N Sklavos - Cryptography, 2021 - mdpi.com
Individual users' sensitive information, such as heart rate, calories burned, or even sleep
patterns, are casually tracked by smart wearable devices to be further processed or …

[HTML][HTML] ChaCha20–Poly1305 authenticated encryption with additional data for transport layer security 1.3

R Serrano, C Duran, M Sarmiento, CK Pham… - Cryptography, 2022 - mdpi.com
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in
computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3 …

[HTML][HTML] Improved secure encryption with energy optimization using random permutation pseudo algorithm based on internet of thing in wireless sensor networks

S Nagaraj, AB Kathole, L Arya, N Tyagi, SB Goyal… - Energies, 2022 - mdpi.com
The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this
expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low …