Evaluation of authentication based elliptic curve cryptography in wireless sensor networks in IoT context

B Bettoumi, R Bouallegue - 2018 26th International Conference …, 2018 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is the promise architecture of Internet of Things (IoT). WSN
is composed by tiny devices (sensors, or actuators) with low battery power and can be …

RNN-assisted network coding for secure heterogeneous Internet of Things with unreliable storage

CH Liao, HH Shuai, LC Wang - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
With the rapid growth of Internet of Things (IoT), integrating a variety of IoT can result in
novel applications. However, IoT devices are often deployed in an open environment where …

Efficient reduction of the transmission delay of the authentication based elliptic curve cryptography in 6LoWPAN wireless sensor networks in the Internet of Things

B Bettoumi, R Bouallegue - 2021 International Wireless …, 2021 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is considered as the backbone of Internet of Things (IoT)
networks. Authentication is the most important phase that guarantees secure access to such …

Mécanismes de sécurité pour l'intégration des RCSFs à l'IoT (Internet of Things)

S Sahraoui - 2016 - eprints.univ-batna2.dz
L'Internet des objets (IoT) est un paradigme prometteur qui étale la connexion Internet de
nos jours pour interconnecter différents types d'objets intelligents, autre que les ordinateurs …

[PDF][PDF] International Journal of Advanced Trends in Computer Science and Engineering

AM Alqudah, H Alquraan, IA Qasmieh, A Alqudah… - International …, 2019 - arxiv.org
Deep Learning is the newest and the current trend of the machine learning field that paid a
lot of the researchers' attention in the recent few years. As a proven powerful machine …

Diet-ESP: IP layer security for IoT

D Migault, T Guggemos, S Killian… - Journal of …, 2017 - content.iospress.com
The number of devices connected through the Internet of Things (IoT) will significantly grow
in the next few years while security of their interconnections is going to be a major …

A blockchain-based lightweight authentication solution for IoT

A Fayad, B Hammi, R Khatoun… - 2019 3rd Cyber …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) systems are almost a part of our daily lives. The security of this new
paradigm had always faced many challenge in order to insure user privacy and …

Security for the Internet of Things

K Cooper - 2015 - diva-portal.org
Summary The Internet of Things (IoT) is an emerging paradigm that will change the way we
interact with objects and computers in the future. It envisions a global network of devices …

Development of an innovative internet of things security system

O Said - International Journal of Computer Science Issues …, 2013 - search.proquest.com
Recently, the concept of Internet of Things (IoT) has become the most popular term through
the widespread of its applications such as greenhouse and telemedicine monitoring …

[PDF][PDF] A note on design flaws in one aggregated-proof based hierarchical authentication scheme for the internet of things

L Liu, Z Cao, O Markowitch - International Journal of Electronics …, 2016 - ijeie.jalaxy.com.tw
Abstract Internet of Things (IoT) aims to integrate physical perceptions, cyber interactions,
and social correlations, with the embedded intelligence. Recently Ning et al. have proposed …