[HTML][HTML] User-centric privacy preserving models for a new era of the Internet of Things

JE Rivadeneira, JS Silva, R Colomo-Palacios… - Journal of Network and …, 2023 - Elsevier
New concepts based on the Internet of Things propose the integration of the human factor as
a key component of novel interconnected ecosystems, to offer them new services and …

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

A Kumar, R Saha, M Conti, G Kumar… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …

An extended type-1 generalized feistel networks: Lightweight block cipher for iot

J Cheng, S Guo, J He - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In the last few years, a large amount of private and sensitive data generated by Internet of
Things (IoT) devices need to be transmitted, stored, and processed in security, which …

Lightweight authentication methods in IoT: Survey

WK Ahmed, RS Mohammed - 2022 International Conference …, 2022 - ieeexplore.ieee.org
In recent years, the Internet of Things has gained prominence as a potential communication
paradigm with a wide range of applications, including smart cities, smart homes, and …

A huffman-based joint compression and encryption scheme for secure data storage using physical unclonable functions

Y Liu, B Li, Y Zhang, X Zhao - Electronics, 2021 - mdpi.com
With the developments of Internet of Things (IoT) and cloud-computing technologies, cloud
servers need storage of a huge volume of IoT data with high throughput and robust security …

Comparative Analysis of Security-Focused Blockchain Architectures: Optimising Security in IoT

C Benali - 2024 6th International Conference on Pattern …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) poses serious security risks and issues due to its growing
number of linked devices. This paper conducts a comparative analysis of various security …

Internet of Things security framework based on near field communication with Otway Rees protocol

M Musa Jaber, S Yussof, MH Ali, S Khalil Abd… - Transactions on … - Wiley Online Library
Abstract Internet of Things (IoT) devices are crucial in different industries because they
provide high‐functioning services to the IoT network connectivity. The IoT devices collect …

[PDF][PDF] Lightweight Authentication Enhancement Using Arnold Chaotic Map and Markov-Chain for Internet of Things Applications.

WK Ahmed, RS Mohammed - … Journal of Intelligent Engineering & Systems, 2023 - inass.org
The Internet of Things (IoT) was a new concept that connected various physical things to the
internet. The IoT is fast expanding and will soon significantly impact everyday life. Although …

[PDF][PDF] IMPROVING LIGHTWEIGHT AUTHENTICATION USING NEW TECHNIQUES FOR IOT

WK AHMED, RS MOHAMMED - Journal of Theoretical and Applied …, 2022 - jatit.org
ABSTRACT The Internet of Things (IoT) is a new paradigm that uses an Internet to
communicate a wide range of physical objects with the cyber scientist. The Internet of Things …

[引用][C] A Monitoring System for Aquaponics Based on Internet of Things

M Ula, RT Adek, B Bustami, S Mulaesyi, MB Juhri - Proceedings of Malikussaleh …, 2022