[HTML][HTML] A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Computer Networks, 2020 - Elsevier
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …

Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey

S Zaman, K Alhazmi, MA Aseeri, MR Ahmed… - Ieee …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …

IoT and digital circular economy: Principles, applications, and challenges

K Voulgaridis, T Lagkas, CM Angelopoulos… - Computer Networks, 2022 - Elsevier
The research interest in Digital Circular Economy models is constantly growing, especially
by studying the impact and implications of circular principles and Internet of Things …

A review on security challenges in internet of things (IoT)

K Shaukat, TM Alam, IA Hameed… - … on automation and …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is the new appearing technology and produces big data
nowadays. Today, IoT is primarily a vision that dictates that everything should be …

[HTML][HTML] Enabling secure data transmission for wireless sensor networks based IoT applications

U Panahi, C Bayılmış - Ain Shams Engineering Journal, 2023 - Elsevier
The high volume of sensed and transferred data among nodes on wireless sensor networks
makes it necessary to keep the data safe. This study offers an improved security mechanism …

[PDF][PDF] Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment

AM Albalawi, MA Almaiah - J. Theor. Appl. Inf. Technol, 2022 - researchgate.net
ABSTRACT Despite Internet of Things (IoT) technology has a great potential to connect
devices and sensors through communication media, such as Wi-Fi, to the internet and …

Security protocol using elliptic curve cryptography algorithm for wireless sensor networks

R Qazi, KN Qureshi, F Bashir, NU Islam, S Iqbal… - Journal of Ambient …, 2021 - Springer
Abstract Information security broadly refers to the state of protection against unsanctioned
access to information or data, principally electronic or digital data. In today's world of modern …

A survey on security requirements for WSNs: focusing on the characteristics related to security

JY Yu, E Lee, SR Oh, YD Seo, YG Kim - IEEE Access, 2020 - ieeexplore.ieee.org
As WSNs combine with a diversity of next-generation technologies, wireless sensor
networks (WSNs) have gained considerable attention as a promising ubiquitous technology …

[PDF][PDF] A Lightweight Encryption Algorithm to Enhance Wireless Sensor Network Security on the Internet of Things.

N Mahlake, TE Mathonsi, D Du Plessis, T Muchenje - J. Commun., 2023 - academia.edu
The Internet of Things (IoT) is an anticipated future technology that promises to connect a
massive number of devices over the internet. Wireless Sensor Networks (WSNs) are …

[HTML][HTML] Towards a lightweight security framework using blockchain and machine learning

S Ismail, M Nouman, DW Dawoud, H Reza - Blockchain: Research and …, 2024 - Elsevier
Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor
networks, necessitating the development of robust countermeasures tailored to their unique …