Energy-efficient secure data fusion scheme for IoT based healthcare system

S Singh, D Kumar - Future Generation Computer Systems, 2023 - Elsevier
Abstract The Internet of Medical Things (IoMT) ecosystem is enormous and complicated,
with several smart devices constantly transferring large amounts of data. Many IoT-based …

Microservices in IoT security: current solutions, research challenges, and future directions

M Driss, D Hasan, W Boulila, J Ahmad - Procedia Computer Science, 2021 - Elsevier
In recent years, the Internet of Things (IoT) technology has led to the emergence of multiple
smart applications in different vital sectors including healthcare, education, agriculture …

Knowledge development in non-fungible tokens (NFT): a scoping review

A Behl, V Pereira, A Nigam, S Wamba… - Journal of Knowledge …, 2024 - emerald.com
Purpose The purpose of this paper is to investigate the potential of NFTs in revolutionizing
innovation management and information systems. Innovations done by firms are blatantly …

A survey on cross-architectural IoT malware threat hunting

AD Raju, IY Abualhaol, RS Giagone, Y Zhou… - IEEE …, 2021 - ieeexplore.ieee.org
In recent years, the increase in non-Windows malware threats had turned the focus of the
cybersecurity community. Research works on hunting Windows PE-based malwares are …

Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges

R Nath, HV Nath - Computers and Electrical Engineering, 2022 - Elsevier
As an emerging technology, the Internet of Things (IoT) is revolutionizing the global
economy and society. The wide adoption of IoT opens up new security and privacy …

Security in the internet of things application layer: requirements, threats, and solutions

M Abbasi, M Plaza-Hernández, J Prieto… - IEEE …, 2022 - ieeexplore.ieee.org
Communication systems and networks are evolving as an integral part of not only of our
everyday life but also as a part of the industry, fundamental infrastructures, companies, etc …

Novel ECC-based RFID mutual authentication protocol for emerging IoT applications

S Gabsi, Y Kortli, V Beroulle, Y Kieffer, A Alasiry… - IEEE …, 2021 - ieeexplore.ieee.org
The implementation of RFID technology has globally impacted several industries and this
revolution has improved the aspects of service delivery in many sectors, such as logistics …

[HTML][HTML] Privacy preservation in wireless sensor network using energy efficient multipath routing for healthcare data

JAIS Masood, M Jeyaselvi, N Senthamarai… - Measurement …, 2023 - Elsevier
Abstract Every day, WSNs (Wireless Sensor Networks) based healthcare systems is
witnessing improvement in providing advice to the health condition and living habits of …

A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud

AK Singh, A Nayyar, A Garg - Multimedia Tools and Applications, 2023 - Springer
With the increased number of smart devices in IoT and cloud, communication messages are
exchanged extensively throughout the network. This requires secure data transfer between …

Understanding security in smart city domains from the ANT-centric perspective

J Fan, W Yang, Z Liu, J Kang, D Niyato… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
A city is a large human settlement that serves the people who live there, and a smart city is a
concept of how cities might better serve their residents through new forms of technology. In …