A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

Survey on smart homes: Vulnerabilities, risks, and countermeasures

B Hammi, S Zeadally, R Khatoun, J Nebhen - Computers & Security, 2022 - Elsevier
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized
the way we live and interact with each other as well as with various types of systems and …

A lightweight ECC-based authentication scheme for Internet of Things (IoT)

B Hammi, A Fayad, R Khatoun, S Zeadally… - IEEE Systems …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) enables the interconnection of physical and virtual objects that are
managed by various types of hardware, software, and communication technologies. The …

Data encryption for internet of things applications based on catalan objects and two combinatorial structures

MH Saračević, SZ Adamović… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
This article presents a novel data encryption technique suitable for Internet of Things (IoT)
applications. The cryptosystem is based on the application of a Catalan object (as a …

SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT

S Sujanthi, S Nithya Kalyani - Wireless Personal Communications, 2020 - Springer
In WSN-assisted IoT, energy efficiency and security which play pivotal role in Quality of
Service (QoS) are still challenging due to its open and resource constrained nature …

BCTrust: A decentralized authentication blockchain-based mechanism

MT Hammi, P Bellot… - 2018 IEEE wireless …, 2018 - ieeexplore.ieee.org
Internet of Things becomes a major part of our lives, billions of autonomous devices are
connected and communicate with each other. This revolutionary paradigm creates a new …

SASC: Secure and authentication-based sensor cloud architecture for intelligent Internet of Things

K Haseeb, A Almogren, I Ud Din, N Islam, A Altameem - Sensors, 2020 - mdpi.com
Nowadays, the integration of Wireless Sensor Networks (WSN) and the Internet of Things
(IoT) provides a great concern for the research community for enabling advanced services …

Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating …

F De Rango, G Potrino, M Tropea, P Fazio - Pervasive and Mobile …, 2020 - Elsevier
Security in the context of Internet of Things (IoT) is a critical challenge. The purpose of this
work is to model and evaluate a dynamic IoT security system based on a generic IoT edge …

Energy efficient decentralized authentication in internet of underwater things using blockchain

A Yazdinejad, RM Parizi, G Srivastava… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
In recent years, there has been rapid growth in developing smart cities. Nearly 70% of the
Earth’ s surface is covered by water and a large proportion of underwater environments …

An efficient mutual authentication scheme for IoT systems

I Alshawish, A Al-Haj - The Journal of Supercomputing, 2022 - Springer
The resource-constrained nature of Internet of Things (IoT) devices and their diversity and
abundancy represent a major challenge for the development of efficient security solutions …