Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters
In this article, we propose an efficient Bloom filter and fuzzy extractor based user
authentication technique, which is significant for an Internet of Things (IoT)-enabled multi …
authentication technique, which is significant for an Internet of Things (IoT)-enabled multi …
Connected and autonomous electric vehicles: Quality of experience survey and taxonomy
More than ever, the automotive industry is shifting towards electric vehicles since
environmental and sustainability concerns are becoming important to potential customers …
environmental and sustainability concerns are becoming important to potential customers …
Information security: A review of information security issues and techniques
F Alkhudhayr, S Alfarraj, B Aljameeli… - 2019 2nd international …, 2019 - ieeexplore.ieee.org
Currently, corporations are more into using distributed systems and relying on networks and
communication facilities for transmitting critical and important information that needs to be …
communication facilities for transmitting critical and important information that needs to be …
Integrity verification mechanism of sensor data based on bilinear map accumulator
Y Ren, J Qi, Y Liu, J Wang, GJ Kim - ACM Transactions on Internet …, 2021 - dl.acm.org
With the explosive growth in the number of IoT devices, ensuring the integrity of the massive
data generated by these devices has become an important issue. Due to the limitation of …
data generated by these devices has become an important issue. Due to the limitation of …
CS-LAKA: A lightweight authenticated key agreement protocol with critical security properties for IoT environments
Y Guo, Y Guo - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
Anonymity, robust synchronization, and perfect forward secrecy are the most important
security properties of authenticated key agreement (AKA) protocols. Designing AKA …
security properties of authenticated key agreement (AKA) protocols. Designing AKA …
Intrusion detection model for IoT using recurrent kernel convolutional neural network
CU Om Kumar, S Marappan, B Murugeshan… - Wireless Personal …, 2023 - Springer
In communication and information technology, the Internet of Things (IoT) creates an
enormous amount of data traffic that permits data analysis to expose and detect unusual …
enormous amount of data traffic that permits data analysis to expose and detect unusual …
A comprehensive review of the internet of things security
Abstract Currently, the Internet of Things (IoT) is the most contentious research subject.
However, IoT still suffers from many security problems, and the security concerns are …
However, IoT still suffers from many security problems, and the security concerns are …
IoT-based smart environment using intelligent intrusion detection system
G Kalnoor, S Gowrishankar - Soft Computing, 2021 - Springer
One of the most basic characteristic features of every smart device in a network based on the
Internet of Things (IoT) is to gather a larger set of data that has been created and then …
Internet of Things (IoT) is to gather a larger set of data that has been created and then …
A provably secure mobile user authentication scheme for big data collection in IoT-enabled maritime intelligent transportation system
The emergence of contemporary technologies like cloud computing and the Internet of
Things (IoT) has revolutionized the trends in the cyber world to serve humanity. There are …
Things (IoT) has revolutionized the trends in the cyber world to serve humanity. There are …
Secure and lightweight communication in heterogeneous IoT environments
F Siddiqui, J Beley, S Zeadally, G Braught - Internet of Things, 2021 - Elsevier
Abstract The Internet of Things (IoT) is a fast growing and rapidly evolving field. Everyday
objects from smart home appliances (eg toasters and refrigerators) to health monitoring …
objects from smart home appliances (eg toasters and refrigerators) to health monitoring …