Evaluation of authentication based elliptic curve cryptography in wireless sensor networks in IoT context
B Bettoumi, R Bouallegue - 2018 26th International Conference …, 2018 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is the promise architecture of Internet of Things (IoT). WSN
is composed by tiny devices (sensors, or actuators) with low battery power and can be …
is composed by tiny devices (sensors, or actuators) with low battery power and can be …
RNN-assisted network coding for secure heterogeneous Internet of Things with unreliable storage
With the rapid growth of Internet of Things (IoT), integrating a variety of IoT can result in
novel applications. However, IoT devices are often deployed in an open environment where …
novel applications. However, IoT devices are often deployed in an open environment where …
Efficient reduction of the transmission delay of the authentication based elliptic curve cryptography in 6LoWPAN wireless sensor networks in the Internet of Things
B Bettoumi, R Bouallegue - 2021 International Wireless …, 2021 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is considered as the backbone of Internet of Things (IoT)
networks. Authentication is the most important phase that guarantees secure access to such …
networks. Authentication is the most important phase that guarantees secure access to such …
Mécanismes de sécurité pour l'intégration des RCSFs à l'IoT (Internet of Things)
S Sahraoui - 2016 - eprints.univ-batna2.dz
L'Internet des objets (IoT) est un paradigme prometteur qui étale la connexion Internet de
nos jours pour interconnecter différents types d'objets intelligents, autre que les ordinateurs …
nos jours pour interconnecter différents types d'objets intelligents, autre que les ordinateurs …
[PDF][PDF] International Journal of Advanced Trends in Computer Science and Engineering
AM Alqudah, H Alquraan, IA Qasmieh, A Alqudah… - International …, 2019 - arxiv.org
Deep Learning is the newest and the current trend of the machine learning field that paid a
lot of the researchers' attention in the recent few years. As a proven powerful machine …
lot of the researchers' attention in the recent few years. As a proven powerful machine …
Diet-ESP: IP layer security for IoT
D Migault, T Guggemos, S Killian… - Journal of …, 2017 - content.iospress.com
The number of devices connected through the Internet of Things (IoT) will significantly grow
in the next few years while security of their interconnections is going to be a major …
in the next few years while security of their interconnections is going to be a major …
A blockchain-based lightweight authentication solution for IoT
Internet of Things (IoT) systems are almost a part of our daily lives. The security of this new
paradigm had always faced many challenge in order to insure user privacy and …
paradigm had always faced many challenge in order to insure user privacy and …
Security for the Internet of Things
K Cooper - 2015 - diva-portal.org
Summary The Internet of Things (IoT) is an emerging paradigm that will change the way we
interact with objects and computers in the future. It envisions a global network of devices …
interact with objects and computers in the future. It envisions a global network of devices …
Development of an innovative internet of things security system
O Said - International Journal of Computer Science Issues …, 2013 - search.proquest.com
Recently, the concept of Internet of Things (IoT) has become the most popular term through
the widespread of its applications such as greenhouse and telemedicine monitoring …
the widespread of its applications such as greenhouse and telemedicine monitoring …
[PDF][PDF] A note on design flaws in one aggregated-proof based hierarchical authentication scheme for the internet of things
L Liu, Z Cao, O Markowitch - International Journal of Electronics …, 2016 - ijeie.jalaxy.com.tw
Abstract Internet of Things (IoT) aims to integrate physical perceptions, cyber interactions,
and social correlations, with the embedded intelligence. Recently Ning et al. have proposed …
and social correlations, with the embedded intelligence. Recently Ning et al. have proposed …