TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
Artificial intelligence-based sensors for next generation IoT applications: A review
SC Mukhopadhyay, SKS Tyagi… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
Sensors play a vital role in our daily lives and are an essential component for Internet of
Things (IoT) based systems as they enable the IoT to collect data to take smart and …
Things (IoT) based systems as they enable the IoT to collect data to take smart and …
A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures
In recent years, Smart Farming (SF) and Precision Agriculture (PA) have attracted attention
from both the agriculture industry as well as the research community. Altogether, SF and PA …
from both the agriculture industry as well as the research community. Altogether, SF and PA …
Government regulations in cyber security: Framework, standards and recommendations
Cyber security refers to the protection of Internet-connected systems, such as hardware,
software as well as data (information) from cyber attacks (adversaries). A cyber security …
software as well as data (information) from cyber attacks (adversaries). A cyber security …
Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges
Agricultural industry is one of the most vital industries that has a major contribution to the
economy due to its share in the Gross Domestic Product (GDP) and as a source of …
economy due to its share in the Gross Domestic Product (GDP) and as a source of …
Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges
As we all know that the technology is projected to be next to humans very soon because of
its holistic growth. Now-a-days, we see a lot of applications that are making our lives …
its holistic growth. Now-a-days, we see a lot of applications that are making our lives …
IoMT malware detection approaches: analysis and research challenges
The advancement in Information and Communications Technology (ICT) has changed the
entire paradigm of computing. Because of such advancement, we have new types of …
entire paradigm of computing. Because of such advancement, we have new types of …
Security requirements for the internet of things: A systematic approach
S Pal, M Hitchens, T Rabehaja, S Mukhopadhyay - Sensors, 2020 - mdpi.com
There has been a tremendous growth in the number of smart devices and their applications
(eg, smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday …
(eg, smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday …
Smart healthcare: Challenges and potential solutions using internet of things (IoT) and big data analytics
Purpose The aim of this paper is to identify some of the challenges that need to be
addressed to accelerate the deployment and adoption of smart health technologies for …
addressed to accelerate the deployment and adoption of smart health technologies for …
Authentication in cloud-driven IoT-based big data environment: Survey and outlook
Abstract The Internet of Things (IoT) is composed of different networked objects (ie, smart
devices) which are interconnected to gather, process, refine, and exchange meaningful data …
devices) which are interconnected to gather, process, refine, and exchange meaningful data …