Zero trust architecture (zta): A comprehensive survey
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …
number of advocates in the critical infrastructure risk management space. The article …
A survey on internet of vehicles: Applications, security issues & solutions
Abstract Internet of Vehicles (IoV) is an emerging concept in intelligent transportation
systems (ITS) to enhance the existing capabilities of VANETs by integrating with the Internet …
systems (ITS) to enhance the existing capabilities of VANETs by integrating with the Internet …
A rigid-flex wearable health monitoring sensor patch for IoT-connected healthcare applications
The Internet of Things (IoT) is a new communication paradigm that can connect elements
from various fields through the Internet. One of the most attractive IoT applications is in the …
from various fields through the Internet. One of the most attractive IoT applications is in the …
Systematic and critical review of rsa based public key cryptographic schemes: Past and present status
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …
unauthorized access. Advancement in technologies and new innovative methods applied by …
Lightweight cryptography system for IoT devices using DNA
MAF Al-Husainy, B Al-Shargabi… - Computers and Electrical …, 2021 - Elsevier
Many lightweight encryption algorithms have been developed for tackling the limitations of
resources on the Internet of Things (IoT) devices. Such devices have limited processing …
resources on the Internet of Things (IoT) devices. Such devices have limited processing …
A secure IoT-based irrigation system for precision agriculture using the expeditious cipher
C Fathy, HM Ali - Sensors, 2023 - mdpi.com
Due to the recent advances in the domain of smart agriculture as a result of integrating
traditional agriculture and the latest information technologies including the Internet of Things …
traditional agriculture and the latest information technologies including the Internet of Things …
Sensors for context-aware smart healthcare: A security perspective
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …
and faster data networks have propelled environments augmented with contextual and real …
SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT
S Sujanthi, S Nithya Kalyani - Wireless Personal Communications, 2020 - Springer
In WSN-assisted IoT, energy efficiency and security which play pivotal role in Quality of
Service (QoS) are still challenging due to its open and resource constrained nature …
Service (QoS) are still challenging due to its open and resource constrained nature …
Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities
Edge computing is a promising paradigm that enhances the capabilities of cloud computing.
In order to continue patronizing the computing services, it is essential to conserve a good …
In order to continue patronizing the computing services, it is essential to conserve a good …
A novel digital signature scheme for advanced asymmetric encryption techniques
Digital signature schemes are practical mechanisms for achieving message integrity,
authenticity, and non-repudiation. Several asymmetric encryption techniques have been …
authenticity, and non-repudiation. Several asymmetric encryption techniques have been …