Internet of things: Systematic literature review of security and future research

M Aqeel - 2020 - diva-portal.org
Abstract The Internet of Things (IoT) is the network of billions of devices, people and services
to Interconnect and exchange information and useful data. The IoT applications are highly …

Fine-Tuned Access Control for Internet of Things

L Jakielaszek, X Xu, X Du… - … Conference on Fog and …, 2022 - ieeexplore.ieee.org
Security within the internet of things suffers from balancing power consumption and memory
usage in devices. We propose two protocols that aim to reduce these strains while …

Routing protocols: Key security issues and challenges in IoT, ad hoc, and sensor networks

C Kumar, S Prakash - Security and Privacy Issues in IoT Devices and …, 2021 - Elsevier
Abstract By 2020, Cisco Inc. predicted that there will be around 50 billion connected devices
across the world. The heterogeneity among devices, the variation in the level of security …

Contribution of IoT and big data in modern health care applications in smart city

M Rath, VK Solanki - Handbook of IoT and Big Data, 2019 - taylorfrancis.com
The IoT and its connected figuring devices are cutting-edge and rising technologies created
recently that encourage more physical, electronic, and mechanical devices to connect with …

Security challenges and resolution in cloud computing and cloud of things

M Rath - Applying Integration Techniques and Methods in …, 2019 - igi-global.com
Cloud computing is a developing zone of computing innovation that shapes the handling
power and the computing assets of many associated, topographically separated PCs …

Internet of Things: Tapping into security and privacy issues associated with the internet of things

N Ahmad - 2021 - diva-portal.org
The Internet of things and its collaborative technologies such as 5G, cloud, artificial
intelligence, analytics, and automation will allow people and objects/devices to …

Secure scheduling for cluster-based TDMA schedule MAC in wireless sensor network

PM Pawar, NP Kulkarni… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
The overwhelming application growth of wireless sensor network (WSN) evolved the
performance requirement of WSN in terms of security. The WSN is susceptible to many …

Data Transmission between IoT Modules using Audio Steganography

S Pleshkova, A Bekiarski - 2023 XXXII International Scientific …, 2023 - ieeexplore.ieee.org
Data in sensor networks, transmitted usually between IoT modules, should be protected from
unauthorized access to prevent erroneous actions with fatal consequences. Methods should …

DICE-Enabled Distributed Security Schemes for the Air Force Internet of Things

H Chi, L Jakielaszek, X Du… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
Security for Internet of Things requires balancing power consumption and memory usage in
devices. In this work, we propose symmetric DICE-based schemes for distributed IoT …

Internet of Things for locating ground loop in a complex situation

MS Rahman, Y Kim, S Kim - 2018 IEEE CPMT Symposium …, 2018 - ieeexplore.ieee.org
Ground loop is a serious problem in a lab or an industry. It conflicts with low-level signals
instrument and sometimes endangers for human being. However, detecting the ground loop …