Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

A survey on internet of vehicles: Applications, security issues & solutions

S Sharma, B Kaushik - Vehicular Communications, 2019 - Elsevier
Abstract Internet of Vehicles (IoV) is an emerging concept in intelligent transportation
systems (ITS) to enhance the existing capabilities of VANETs by integrating with the Internet …

A rigid-flex wearable health monitoring sensor patch for IoT-connected healthcare applications

T Wu, F Wu, C Qiu, JM Redouté… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a new communication paradigm that can connect elements
from various fields through the Internet. One of the most attractive IoT applications is in the …

Systematic and critical review of rsa based public key cryptographic schemes: Past and present status

R Imam, QM Areeb, A Alturki, F Anwer - IEEE access, 2021 - ieeexplore.ieee.org
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …

Lightweight cryptography system for IoT devices using DNA

MAF Al-Husainy, B Al-Shargabi… - Computers and Electrical …, 2021 - Elsevier
Many lightweight encryption algorithms have been developed for tackling the limitations of
resources on the Internet of Things (IoT) devices. Such devices have limited processing …

A secure IoT-based irrigation system for precision agriculture using the expeditious cipher

C Fathy, HM Ali - Sensors, 2023 - mdpi.com
Due to the recent advances in the domain of smart agriculture as a result of integrating
traditional agriculture and the latest information technologies including the Internet of Things …

Sensors for context-aware smart healthcare: A security perspective

E Batista, MA Moncusi, P López-Aguilar… - Sensors, 2021 - mdpi.com
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …

SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT

S Sujanthi, S Nithya Kalyani - Wireless Personal Communications, 2020 - Springer
In WSN-assisted IoT, energy efficiency and security which play pivotal role in Quality of
Service (QoS) are still challenging due to its open and resource constrained nature …

Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities

M Yahuza, MYIB Idris, AWBA Wahab, ATS Ho… - IEEE …, 2020 - ieeexplore.ieee.org
Edge computing is a promising paradigm that enhances the capabilities of cloud computing.
In order to continue patronizing the computing services, it is essential to conserve a good …

A novel digital signature scheme for advanced asymmetric encryption techniques

F Lalem, A Laouid, M Kara, M Al-Khalidi, A Eleyan - Applied Sciences, 2023 - mdpi.com
Digital signature schemes are practical mechanisms for achieving message integrity,
authenticity, and non-repudiation. Several asymmetric encryption techniques have been …