Internet of things: Systematic literature review of security and future research
M Aqeel - 2020 - diva-portal.org
Abstract The Internet of Things (IoT) is the network of billions of devices, people and services
to Interconnect and exchange information and useful data. The IoT applications are highly …
to Interconnect and exchange information and useful data. The IoT applications are highly …
Fine-Tuned Access Control for Internet of Things
Security within the internet of things suffers from balancing power consumption and memory
usage in devices. We propose two protocols that aim to reduce these strains while …
usage in devices. We propose two protocols that aim to reduce these strains while …
Routing protocols: Key security issues and challenges in IoT, ad hoc, and sensor networks
C Kumar, S Prakash - Security and Privacy Issues in IoT Devices and …, 2021 - Elsevier
Abstract By 2020, Cisco Inc. predicted that there will be around 50 billion connected devices
across the world. The heterogeneity among devices, the variation in the level of security …
across the world. The heterogeneity among devices, the variation in the level of security …
Contribution of IoT and big data in modern health care applications in smart city
M Rath, VK Solanki - Handbook of IoT and Big Data, 2019 - taylorfrancis.com
The IoT and its connected figuring devices are cutting-edge and rising technologies created
recently that encourage more physical, electronic, and mechanical devices to connect with …
recently that encourage more physical, electronic, and mechanical devices to connect with …
Security challenges and resolution in cloud computing and cloud of things
M Rath - Applying Integration Techniques and Methods in …, 2019 - igi-global.com
Cloud computing is a developing zone of computing innovation that shapes the handling
power and the computing assets of many associated, topographically separated PCs …
power and the computing assets of many associated, topographically separated PCs …
Internet of Things: Tapping into security and privacy issues associated with the internet of things
N Ahmad - 2021 - diva-portal.org
The Internet of things and its collaborative technologies such as 5G, cloud, artificial
intelligence, analytics, and automation will allow people and objects/devices to …
intelligence, analytics, and automation will allow people and objects/devices to …
Secure scheduling for cluster-based TDMA schedule MAC in wireless sensor network
PM Pawar, NP Kulkarni… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
The overwhelming application growth of wireless sensor network (WSN) evolved the
performance requirement of WSN in terms of security. The WSN is susceptible to many …
performance requirement of WSN in terms of security. The WSN is susceptible to many …
Data Transmission between IoT Modules using Audio Steganography
S Pleshkova, A Bekiarski - 2023 XXXII International Scientific …, 2023 - ieeexplore.ieee.org
Data in sensor networks, transmitted usually between IoT modules, should be protected from
unauthorized access to prevent erroneous actions with fatal consequences. Methods should …
unauthorized access to prevent erroneous actions with fatal consequences. Methods should …
DICE-Enabled Distributed Security Schemes for the Air Force Internet of Things
Security for Internet of Things requires balancing power consumption and memory usage in
devices. In this work, we propose symmetric DICE-based schemes for distributed IoT …
devices. In this work, we propose symmetric DICE-based schemes for distributed IoT …
Internet of Things for locating ground loop in a complex situation
MS Rahman, Y Kim, S Kim - 2018 IEEE CPMT Symposium …, 2018 - ieeexplore.ieee.org
Ground loop is a serious problem in a lab or an industry. It conflicts with low-level signals
instrument and sometimes endangers for human being. However, detecting the ground loop …
instrument and sometimes endangers for human being. However, detecting the ground loop …