A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives

DS Bhatti, S Saleem, HN Lee, KI Kim - EURASIP Journal on Wireless …, 2024 - Springer
The expansion of wireless communication introduces security vulnerabilities, emphasizing
the essential need for secure systems that prioritize confidentiality, integrity, and other key …

Design and evaluation of memory efficient data structure scheme for energy drainage attacks in wireless sensor networks

DS Bhatti, S Saleem, Z Ali, TJ Park, B Suh… - IEEE …, 2024 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) are deployed on a large scale and require protection from
malicious energy drainage attacks, particularly those directed at the routing layer. The …

IoT-enhanced transport and monitoring of medicine using sensors, MQTT, and secure short message service

DS Bhatti, MM Hussain, B Suh, Z Ali, I Akobir… - IEEE Access, 2024 - ieeexplore.ieee.org
Since its inception more than a decade ago, Internet of Things (IoT) technology has been
guiding people in the development of a world full of smart solutions in which all devices and …

ChessCrypt: enhancing wireless communication security in smart cities through dynamically generated S-Box with chess-based nonlinearity

A Banga, N Iqbal, A Ikram, N Innab, AS Alluhaidan… - Scientific Reports, 2024 - nature.com
In the contemporary landscape of smart cities, ensuring the security and confidentiality of
transmitted data has become paramount. The proliferation of Internet of Things (IoT) devices …

Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie–Hellman (DH) in single and multi-server queuing scenarios

DS Bhatti, S Sidrat, S Saleem, AW Malik, BK Suh… - Plos one, 2024 - journals.plos.org
The rapid replacement of PSTN with VOIP networks indicates the definitive phase-out of the
PBX/PABX with smartphone-based VOIP technology that uses WLAN connectivity for local …

Energy Efficient and Connectivity Aware Self-Organizing Distributed IoT Topology Control

A Seyyedi, S Dortaj, M Bohlouli… - arXiv preprint arXiv …, 2023 - arxiv.org
Internet of Things has pervaded every area of modern life. From a research and industry
standpoint, there has been an increasing demand and desire in recent years to develop …

Wireless Secret Sharing Game for Internet of Things

L Miao, D Jiang, H Zhang - Sustainability, 2023 - mdpi.com
In the era of Internet of Things (IoT), billions of small but smart wireless devices work
together to make our cities more intelligent and sustainable. One challenge is that many IoT …

Post-Quantum Group Key Management in IoTs

F Samiullah, ML Gan, S Akleylek… - 2023 25th International …, 2023 - ieeexplore.ieee.org
In our interconnected society, effective group communication is crucial for facilitating the
efficient and secure interchange of data between multiple endpoints, particularly within the …

Beyond Traditional Security: A Review on Information-Theoretic Secret Key Generation at Wireless Physical Layer

DS Bhatti, H Choi, HN Lee - Authorea Preprints, 2024 - techrxiv.org
In the rapidly evolving landscape of wireless communication, securing transmitted
information remains a critical challenge. This study provides a comprehensive review of …

A Key Management Scheme of Mobile Ad Hoc Network

D Liu, L Li, J Sun, Y Bo - Proceedings of the 2021 2nd International …, 2021 - dl.acm.org
Some schemes need the participation of trusted key management center when generating
the sub key of network node; some schemes need the use of secure channel when network …