Cryptography algorithms for enhancing IoT security

F Thabit, O Can, AO Aljahdali, GH Al-Gaphari… - Internet of Things, 2023 - Elsevier
In today's fast-paced world, a new technology paradigm known as the Internet of Things
(IoT) is advancing every business. It provides communication between the digital and …

Data Privacy and Confidentiality in Healthcare Applications of IoT-Enabled Wireless Sensor Networks

G Premi, P Solainayagi, C Srinivasan… - … For Smart Nation …, 2023 - ieeexplore.ieee.org
In this paper, a comprehensive framework for protecting sensitive healthcare information in
Internet of Things (IoT)-enabled Wireless Sensor Network (WSN) is presented. Sensitive …

Integration of data science and IoT with blockchain for Industry 4.0

P Gangwani, A Perez-Pons, S Joshi… - Blockchain and its …, 2023 - Springer
The field of the Industrial Internet of Things (IIoT) is developing rapidly and gaining abundant
attention throughout our society. The vast volume of raw information that these IoT devices …

Authentication of IoT device and IoT server using security key

W Alnahari, MT Quasim - 2021 International Congress of …, 2021 - ieeexplore.ieee.org
IoT is an emerging topic in the field of IT that has attracted the interest of researchers from
different parts of the world. Authentication of IoT includes the establishment of a model for …

Privacy concerns, IoT devices and attacks in smart cities

W Alnahari, MT Quasim - 2021 International Congress of …, 2021 - ieeexplore.ieee.org
The advancement of technology and wide adoption of the Internet of Things (IoT) across the
board will soon make the smart city a reality. Many governments are currently planning on …

A proposed application for controlling overweight and obesity within the framework of the internet of things

R Alturki, AI Alharbi, SS AlQahtani… - Mobile Information …, 2021 - Wiley Online Library
Currently, overweight and obesity are two problems for global health that affect people's
quality of life. The Internet of Things (IoT) has raised the possibility of digital interaction taken …

A Novel Authentication Scheme Based on Verifiable Credentials Using Digital Identity in the Context of Web 3.0

SL Nita, MI Mihailescu - Electronics, 2024 - mdpi.com
This paper explores the concept of digital identity in the evolving landscape of Web 3.0,
focusing on the development and implications of a novel authentication scheme using …

An IoT-based low-cost architecture for smart libraries using SDN

H Xu, W Liu, L Li, Q Zhou - Scientific Reports, 2024 - nature.com
In the evolving landscape of smart libraries, this research pioneers an IoT-based low-cost
architecture utilizing Software-Defined Networking (SDN). The increasing demand for more …

[PDF][PDF] System Penetration: Concepts, Attack Methods, and Defense Strategies

MT Quasim, AN Al Hawi, M Meraj - 2023 - easychair.org
Penetration testing has become an integral part of a comprehensive security program. Pen
tests are conducted by ethical hackers to mimic the strategies and actions of the attacker …

[PDF][PDF] Analysis of Cyber Forensics Issues in Internet of Things (IoT)

M Meraj - EasyChair. Available online: https://easychair. org …, 2022 - easychair.org
Non-traditional computer devices, such as mechanical and Internet of Things (IoT) devices,
may communicate data across a network without human or machine involvement. Because …