Retracted article: Secure routing scheme with multi-dimensional trust evaluation for wireless sensor network

M Mathapati, TS Kumaran, A Muruganandham… - Journal of Ambient …, 2021 - Springer
Security has been always a major concern in wireless network irrespective of evolving safety
protocols, which motivates various researchers to explore an effective security solution …

[PDF][PDF] Internet of things security: A review of enabled application challenges and solutions

M Algarni, M Alkhelaiwi… - International Journal of …, 2021 - pdfs.semanticscholar.org
The Internet of Things (IoT) has been widely used in every aspect of life. The rapid
development of IoT technologies raises concerns regarding security and privacy. IoT …

[PDF][PDF] Comparative study of several operation modes of AES algorithm for encryption ECG biomedical signal

ME Hameed, MM Ibrahim, N Abd Manap… - International Journal of …, 2019 - academia.edu
Biomedical signal processing provides a cross-disciplinary international forum through
which research on signal and images measurement and analysis in clinical medicine as …

Exploiting memory corruption vulnerabilities in connman for iot devices

KV English, I Obaidat, M Sridhar - 2019 49th Annual IEEE/IFIP …, 2019 - ieeexplore.ieee.org
In the recent past, there has been a rapid increase in attacks on consumer Internet-of-Things
(IoT) devices. Several attacks currently focus on easy targets for exploitation, such as weak …

[PDF][PDF] A survey on hardware-based security mechanisms for internet of things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - ArXiv. org, 2019 - par.nsf.gov
This paper provides a proof of concept for using SRAM based Physically Unclonable
Functions (PUFs) to generate private keys for IoT devices. PUFs are utilized, as there is …

Secure ABE scheme for access management in blockchain-based IoT

J Zhang, Y Xin, Y Gao, X Lei, Y Yang - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) has been widely used in various fields of our daily life in the past
years. Obviously, in the future, the significance of its security will be more evident and …

Power grid surveillance and control based on wireless sensor network technologies: Review and future directions

AH Abdulwahid - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
In this paper, the concept of the smart grid and the emerging challenges of wireless
communication technology for use on the smart grid (SG) is reviewed. One modern-day …

PALOT: Profiling and authenticating users leveraging internet of things

P Nespoli, M Zago, A Huertas Celdrán, M Gil Pérez… - Sensors, 2019 - mdpi.com
Continuous authentication was introduced to propose novel mechanisms to validate users'
identity and address the problems and limitations exposed by traditional techniques …

Integration with 3D visualization and IoT-based sensors for real-time structural health monitoring

HF Chang, M Shokrolah Shirazi - Sensors, 2021 - mdpi.com
Real-time monitoring on displacement and acceleration of a structure provides vital
information for people in different applications such as active control and damage warning …

[PDF][PDF] An enhanced lossless compression with cryptography hybrid mechanism for ECG biomedical signal monitoring

ME Hameed, MM Ibrahim, NA Manap… - International Journal of …, 2020 - academia.edu
Due to their use in daily life situation, demand for remote health applications and e-health
monitoring equipment is growing quickly. In this phase, for fast diagnosis and therapy …