InterOpT: A new testing platform based on oneM2M standards for IoT systems

ST Demirel, M Demirel, I Dogru… - … Symposium on Networks …, 2019 - ieeexplore.ieee.org
Nowadays, with the developing technologies, IoT based solutions are increasing day by
day. In the scope of this study, a test platform has been developed to test the IoT solutions …

Security assertion of IoT devices using cloud of things perception

M Rath, B Pati - International Journal of Interdisciplinary …, 2019 - igi-global.com
Abstract Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current
developing technology era are expected to be more and more invasive, making them …

Monitoring connectivity of Internet of Things device on ZigBee protocol

B Purnama, R Budiarto, D Stiawan… - … and Computer Science …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) networks operators may not be fully aware whether each IoT device
in their network is functioning safe enough from cyber-attacks. This paper develops an IoT …

An identity based-identification scheme with tight security against active and concurrent adversaries

J Chia, JJ Chin - IEEE Access, 2020 - ieeexplore.ieee.org
Identification schemes are used by machines to securely authenticate the identity of other
machines or their users over computer networks. As conventional public key schemes …

A comprehensive study of the Design and Security of the IoT layer Attacks

MS Rajan, JR Arunkumar… - 2021 6th International …, 2021 - ieeexplore.ieee.org
IoT is the network of thousands of individuals, resources and expertise interconnecting and
sharing. IoT implementations are strongly validated by increased usability, reliability and …

Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks

A Kardi, R Zagrouba, M Alqahtani - 2018 21st Saudi Computer …, 2018 - ieeexplore.ieee.org
With the increased use of wireless sensor networks (WSNs) in military, health monitoring,
commercial, and home environments, developing a strong and durable security architecture …

[HTML][HTML] A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures

J Chia, JJ Chin, SC Yip - Symmetry, 2021 - mdpi.com
The security of cryptographic schemes is proven secure by reducing an attacker which
breaks the scheme to an algorithm that could be used to solve the underlying hard …

Internet of Things (IoT) enabling technologies and applications—A study

DK Sreekantha, A Koujalagi, TM Girish… - … Conference on Artificial …, 2019 - Springer
Internet of things (IoT) is a worldwide network of the autonomous real-world and digital
internet enabled things connecting and communicating with each other seamlessly. The …

[PDF][PDF] An efficient algorithm for end to end latency optimization over IEEE 802.15. 4 wireless network for IoT applications

I Dbibih, I Iala, FZE Biach, O Zytoune - International Journal of Intelligent …, 2021 - inass.org
The continuous evolution of new wireless technologies has given birth to new application
areas for the Internet of Things (IoT) such as Smart Cities, Smart Home, Intelligent Transport …

A Secure Authentication mechanism for accessing IoT devices through Mobile App

B Singh, R Lal, S Singla - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
In this century IoT devices play a major role in connecting all things to the internet so that
users can easily access and operate it remotely. The main advantage of using IoT devices is …