Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city

F Wang, G Li, Y Wang, W Rafique… - ACM Transactions on …, 2023 - dl.acm.org
With the continuous increment of city volume and size, a number of traffic-related urban units
(eg, vehicles, roads, buildings, etc.) are emerging rapidly, which plays a heavy burden on …

Leveraging power consumption for anomaly detection on IoT devices in smart homes

K Nimmy, M Dilraj, S Sankaran, K Achuthan - Journal of Ambient …, 2023 - Springer
Anomaly detection in smart homes is paramount in the prevailing information age as smart
devices remain susceptible to sophisticated cyber-attacks. Hackers exploit vulnerabilities …

[PDF][PDF] DNA cryptographic approaches: state of art, opportunities, and cutting edge perspectives

MA Alhija, N Turab, A Abuthawabeh… - J. Theor. Appl. Inf …, 2022 - researchgate.net
ABSTRACT DNA cryptography approaches are attracting considerable interest widespread
attention due to its unbreakable algorithms. They have enriched designing and …

Web of things: security challenges and mechanisms

R Sardar, T Anees - Ieee Access, 2021 - ieeexplore.ieee.org
Web of things (WoT) is an improved and most promising infrastructure of the internet of
things (IoT) which permits the smart things to not only integrate to the internet but also to the …

Survey on recent smart gateways for smart home: Systems, technologies, and challenges

W Yan, Z Wang, H Wang, W Wang… - Transactions on …, 2022 - Wiley Online Library
A smart gateway, which plays a crucial role in a smart home, generally bridges the inside
and outside home networks, as well as collaboratively manages the intelligent Internet of …

[HTML][HTML] Evaluation of Correlation between Temperature of IoT Microcontroller Devices and Blockchain Energy Consumption in Wireless Sensor Networks

KG Arachchige, P Branch, J But - Sensors, 2023 - mdpi.com
Blockchain technology is an information security solution that operates on a distributed
ledger system. Blockchain technology has considerable potential for securing Internet of …

Computation-transferable authenticated key agreement protocol for smart healthcare

W Wang, H Huang, F Xiao, Q Li, L Xue… - Journal of Systems …, 2021 - Elsevier
Smart healthcare plays an important role in contemporary society while its security and
privacy issues remain inevitable challenges. Authenticated key agreement (AKA) …

Use of blockchain in health sensor networks to secure information integrity and accountability

K Godawatte, P Branch, J But - Procedia Computer Science, 2022 - Elsevier
Accountability and integrity are likely to play a key role in emerging health sensor network
environments. Since health sensor devices are low capability devices, they are particularly …

[HTML][HTML] Lightweight digital certificate management and efficacious symmetric cryptographic mechanism over industrial Internet of Things

AA Ahmed - Sensors, 2021 - mdpi.com
The certificate authority, a trusted entity, issues digital certificates which contain identity
credentials to help Industrial Internet of Things (IIoT) devices to represent their authenticity in …

[HTML][HTML] Security policies definition and enforcement utilizing policy control function framework in 5G

GP Gomez, JM Batalla, Y Miche, S Holtmanns… - Computer …, 2021 - Elsevier
This research analyses new approaches to security enforcement in fifth generation (5G)
architecture from end to end perspective. With the aim of finding a suitable and effective …