[HTML][HTML] User-centric privacy preserving models for a new era of the Internet of Things
JE Rivadeneira, JS Silva, R Colomo-Palacios… - Journal of Network and …, 2023 - Elsevier
New concepts based on the Internet of Things propose the integration of the human factor as
a key component of novel interconnected ecosystems, to offer them new services and …
a key component of novel interconnected ecosystems, to offer them new services and …
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …
People, processes, and things are connected with the Internet through IoT. With the …
An extended type-1 generalized feistel networks: Lightweight block cipher for iot
J Cheng, S Guo, J He - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In the last few years, a large amount of private and sensitive data generated by Internet of
Things (IoT) devices need to be transmitted, stored, and processed in security, which …
Things (IoT) devices need to be transmitted, stored, and processed in security, which …
Lightweight authentication methods in IoT: Survey
WK Ahmed, RS Mohammed - 2022 International Conference …, 2022 - ieeexplore.ieee.org
In recent years, the Internet of Things has gained prominence as a potential communication
paradigm with a wide range of applications, including smart cities, smart homes, and …
paradigm with a wide range of applications, including smart cities, smart homes, and …
A huffman-based joint compression and encryption scheme for secure data storage using physical unclonable functions
Y Liu, B Li, Y Zhang, X Zhao - Electronics, 2021 - mdpi.com
With the developments of Internet of Things (IoT) and cloud-computing technologies, cloud
servers need storage of a huge volume of IoT data with high throughput and robust security …
servers need storage of a huge volume of IoT data with high throughput and robust security …
Comparative Analysis of Security-Focused Blockchain Architectures: Optimising Security in IoT
C Benali - 2024 6th International Conference on Pattern …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) poses serious security risks and issues due to its growing
number of linked devices. This paper conducts a comparative analysis of various security …
number of linked devices. This paper conducts a comparative analysis of various security …
Internet of Things security framework based on near field communication with Otway Rees protocol
M Musa Jaber, S Yussof, MH Ali, S Khalil Abd… - Transactions on … - Wiley Online Library
Abstract Internet of Things (IoT) devices are crucial in different industries because they
provide high‐functioning services to the IoT network connectivity. The IoT devices collect …
provide high‐functioning services to the IoT network connectivity. The IoT devices collect …
[PDF][PDF] Lightweight Authentication Enhancement Using Arnold Chaotic Map and Markov-Chain for Internet of Things Applications.
WK Ahmed, RS Mohammed - … Journal of Intelligent Engineering & Systems, 2023 - inass.org
The Internet of Things (IoT) was a new concept that connected various physical things to the
internet. The IoT is fast expanding and will soon significantly impact everyday life. Although …
internet. The IoT is fast expanding and will soon significantly impact everyday life. Although …
[PDF][PDF] IMPROVING LIGHTWEIGHT AUTHENTICATION USING NEW TECHNIQUES FOR IOT
WK AHMED, RS MOHAMMED - Journal of Theoretical and Applied …, 2022 - jatit.org
ABSTRACT The Internet of Things (IoT) is a new paradigm that uses an Internet to
communicate a wide range of physical objects with the cyber scientist. The Internet of Things …
communicate a wide range of physical objects with the cyber scientist. The Internet of Things …