Reliable Internet of Things: Challenges and future trends

MZ Khan, OH Alhazmi, MA Javed, H Ghandorh… - Electronics, 2021 - mdpi.com
The Internet of Things (IoT) is a vital component of many future industries. By intelligent
integration of sensors, wireless communications, computing techniques, and data analytics …

[HTML][HTML] A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection

M Vishwakarma, N Kesswani - Decision Analytics Journal, 2023 - Elsevier
Technology is pivotal in the rapid growth of services and intensifying the quality of life.
Recent technology, like the Internet of Things (IoT), demonstrates an impressive …

[HTML][HTML] Authentication, Access Control and Scalability models in Internet of Things Security-A Review

M Kokila, S Reddy - Cyber Security and Applications, 2024 - Elsevier
Abstract The Internet of Things (IoT) leads to the next phase of human interaction with
technology. With the help of the IoT, physical objects can be given the ability to generate …

Maximizing IoT Security: An Examination of Cryptographic Algorithms

L Arya, YK Sharma, R Kumar… - … on Power Energy …, 2023 - ieeexplore.ieee.org
The proliferation of Internet of Things (IoT) devices has created a ubiquitous network of
interconnected sensors and devices that generate and exchange vast amounts of data. With …

Enabling secure data exchange through the iota tangle for iot constrained devices

A Carelli, A Palmieri, A Vilei, F Castanier, A Vesco - Sensors, 2022 - mdpi.com
Internet-of-Things (IoT) and sensor technologies have enabled the collection of data in a
distributed fashion for analysis and evidence-based decision making. However, security …

An energy efficient encryption technique for the Internet of Things sensor nodes

I Sultan, MT Banday - International Journal of Information Technology, 2024 - Springer
Securing data at the back end in Internet of Things (IoT) applications, such as a cloud server,
is easy due to the ample computational resources at that stage. However, securing the data …

Hyperchaos-based cryptosytem to secure WSN data transfer for smart home application

S Benzegane, M Bouhedda, N Batel - International Journal of Information …, 2024 - Springer
The purpose of this work is to introduce a new crypto-system for the protection of information
transfer within the context of the intelligent home implementation. A Hyperchaos-based Key …

Low-cost client-side encryption and secure Internet of things (IoT) provisioning

J Mamvong, G Goteng, Y Gao - Frontiers of Computer Science, 2022 - Springer
Conclusion Security and ease of provisioning of IoT devices onto cloud infrastructure is
instrumental to the deployment of IoT devices. With not much information available on the …

[PDF][PDF] SLDEB: Design of a Secure and Lightweight Dynamic Encryption Bio-Inspired Model for IoT Networks

B Kataria, H Jethva, P Shinde, S Banait… - Int. J. Saf. Secur …, 2023 - researchgate.net
Accepted: 14 March 2023 Designing encryption models for IoT deployments requires
analysis of multiple network level constraints. These include, estimation of energy …

[PDF][PDF] DES22: DES-based algorithm with improved security

M Barhoush, B Abed-Alguni, R Hammad… - Jordan J Comput Inf …, 2022 - researchgate.net
We live in a world where the Internet has become the backbone of most of our dealings. The
Internet has turned this big planet into a small village. The Internet can be reached by …