E-hip: An energy-efficient openhip-based security in internet of things networks

P Kaňuch, D Macko - sensors, 2019 - mdpi.com
The rapidly growing segment of the Internet of Things (IoT) makes the security threats more
prominent than ever. The research around communication security and cybersecurity in …

An integrated trust assisted energy efficient greedy data aggregation for wireless sensor networks

KP Uvarajan, C Gowri Shankar - Wireless Personal Communications, 2020 - Springer
Wireless sensor networks (WSN) gathers information pertaining to sensitive data. As
because the sensor nodes in WSN are remote and unattended for a longer period of time …

T-IP: A self-trustworthy and secure Internet protocol

X Wang, H Zhou, J Su, B Wang, Q Xing… - China …, 2018 - ieeexplore.ieee.org
IPsec has become an important supplement of IP to provide security protection. However,
the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide …

Efficient reduction of the transmission delay of the authentication based elliptic curve cryptography in 6LoWPAN wireless sensor networks in the Internet of Things

B Bettoumi, R Bouallegue - 2021 International Wireless …, 2021 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is considered as the backbone of Internet of Things (IoT)
networks. Authentication is the most important phase that guarantees secure access to such …

Confidentiality and Security for IoT Based Healthcare.,-

I Romdhani - Securing the Internet of Things, 2017 - books.google.com
Internet of Things (IoT) deployment will open doors to a huge number of applications that
would deeply improve our daily life. E-health applications are one of the typical applications …

[PDF][PDF] Data confidentiality in the Internet of Things

MR Abdmeziem - 2016 - researchgate.net
Abstract Internet of Things (IoT) paradigm makes billions of our everyday life objects part of
the Internet. This interconnection generates a huge amount of private data, which needs to …

Lightweight encryption algorithms, technologies, and architectures in Internet of Things: A survey

Rishabh, TP Sharma - Innovations in Computer Science and Engineering …, 2020 - Springer
Internet of things is a fast-growing field of industry as a lot of IoT applications are introduced
in the market. Its popularity is also growing because of its ease of use and its applications …

Network security in evolving networking technologies: developments and future directions

U Yadav, A Sharma - Evolving Networking Technologies …, 2023 - Wiley Online Library
More than one computer system interconnected through wired or wireless links forms a
network. Apart from a variety of networking protocols, networks broadly use client‐server or …

Mécanismes de sécurité pour l'intégration des RCSFs à l'IoT (Internet of Things)

S Sahraoui - 2016 - eprints.univ-batna2.dz
L'Internet des objets (IoT) est un paradigme prometteur qui étale la connexion Internet de
nos jours pour interconnecter différents types d'objets intelligents, autre que les ordinateurs …

Design of retrievable data perturbation approach and TPA for public cloud data security

L Kumar, V Rishiwal - Wireless Personal Communications, 2019 - Springer
In cloud computing, privacy is turn out to be the foremost difficulty. Therefore, this document
is used to develop the cloud data defense by the help of an efficient data perturbation …