InterOpT: A new testing platform based on oneM2M standards for IoT systems
ST Demirel, M Demirel, I Dogru… - … Symposium on Networks …, 2019 - ieeexplore.ieee.org
Nowadays, with the developing technologies, IoT based solutions are increasing day by
day. In the scope of this study, a test platform has been developed to test the IoT solutions …
day. In the scope of this study, a test platform has been developed to test the IoT solutions …
Security assertion of IoT devices using cloud of things perception
Abstract Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current
developing technology era are expected to be more and more invasive, making them …
developing technology era are expected to be more and more invasive, making them …
Monitoring connectivity of Internet of Things device on ZigBee protocol
Internet of Things (IoT) networks operators may not be fully aware whether each IoT device
in their network is functioning safe enough from cyber-attacks. This paper develops an IoT …
in their network is functioning safe enough from cyber-attacks. This paper develops an IoT …
An identity based-identification scheme with tight security against active and concurrent adversaries
J Chia, JJ Chin - IEEE Access, 2020 - ieeexplore.ieee.org
Identification schemes are used by machines to securely authenticate the identity of other
machines or their users over computer networks. As conventional public key schemes …
machines or their users over computer networks. As conventional public key schemes …
A comprehensive study of the Design and Security of the IoT layer Attacks
MS Rajan, JR Arunkumar… - 2021 6th International …, 2021 - ieeexplore.ieee.org
IoT is the network of thousands of individuals, resources and expertise interconnecting and
sharing. IoT implementations are strongly validated by increased usability, reliability and …
sharing. IoT implementations are strongly validated by increased usability, reliability and …
Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks
A Kardi, R Zagrouba, M Alqahtani - 2018 21st Saudi Computer …, 2018 - ieeexplore.ieee.org
With the increased use of wireless sensor networks (WSNs) in military, health monitoring,
commercial, and home environments, developing a strong and durable security architecture …
commercial, and home environments, developing a strong and durable security architecture …
[HTML][HTML] A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures
The security of cryptographic schemes is proven secure by reducing an attacker which
breaks the scheme to an algorithm that could be used to solve the underlying hard …
breaks the scheme to an algorithm that could be used to solve the underlying hard …
Internet of Things (IoT) enabling technologies and applications—A study
DK Sreekantha, A Koujalagi, TM Girish… - … Conference on Artificial …, 2019 - Springer
Internet of things (IoT) is a worldwide network of the autonomous real-world and digital
internet enabled things connecting and communicating with each other seamlessly. The …
internet enabled things connecting and communicating with each other seamlessly. The …
[PDF][PDF] An efficient algorithm for end to end latency optimization over IEEE 802.15. 4 wireless network for IoT applications
I Dbibih, I Iala, FZE Biach, O Zytoune - International Journal of Intelligent …, 2021 - inass.org
The continuous evolution of new wireless technologies has given birth to new application
areas for the Internet of Things (IoT) such as Smart Cities, Smart Home, Intelligent Transport …
areas for the Internet of Things (IoT) such as Smart Cities, Smart Home, Intelligent Transport …
A Secure Authentication mechanism for accessing IoT devices through Mobile App
In this century IoT devices play a major role in connecting all things to the internet so that
users can easily access and operate it remotely. The main advantage of using IoT devices is …
users can easily access and operate it remotely. The main advantage of using IoT devices is …