IoT Group Key Management using Incremental Gaussian Mixture Model
Sensors and the internet are used in the Internet of Things (IoT) to link physical and
computer networks. Future IoT development will be heavily influenced by machine learning …
computer networks. Future IoT development will be heavily influenced by machine learning …
Intrusion detection in Edge-of-Things computing
AS Almogren - Journal of Parallel and Distributed Computing, 2020 - Elsevier
Abstract Edge-of-Things (EoT) is a new evolving computing model driven by the Internet of
Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to …
Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to …
Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey
S Szymoniak - ACM Computing Surveys, 2024 - dl.acm.org
We use sensor technologies in many areas of everyday life. We use sensors to check and
study various phenomena and to improve our lives. Hence, the sensors are used in …
study various phenomena and to improve our lives. Hence, the sensors are used in …
Decentralized lightweight group key management for dynamic access control in IoT environments
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the
emergence of new access control technologies in order to maintain this data safe from …
emergence of new access control technologies in order to maintain this data safe from …
Optimization of quality of service using ECEBA protocol in wireless body area network
RS Pawar, DR Kalbande - International Journal of Information Technology, 2023 - Springer
Smart healthcare using IoT is the Internet of Healthcare Things (IoHT) that consists of smart
monitoring of health remotely by forming the wireless body area networks (WBANs). Each …
monitoring of health remotely by forming the wireless body area networks (WBANs). Each …
A secure and efficient ECC-based scheme for edge computing and internet of things
H AlMajed, A AlMogren - Sensors, 2020 - mdpi.com
Recent growth in the Internet of Things (IoT) has raised security concerns over the
confidentiality of data exchanged between IoT devices and the edge. Many IoT systems …
confidentiality of data exchanged between IoT devices and the edge. Many IoT systems …
SE-ENC: A secure and efficient encoding scheme using elliptic curve cryptography
HN Almajed, AS Almogren - IEEE Access, 2019 - ieeexplore.ieee.org
Many applications use asymmetric cryptography to secure communications between two
parties. One of the main issues with asymmetric cryptography is the need for vast amounts of …
parties. One of the main issues with asymmetric cryptography is the need for vast amounts of …
A novel decentralized group key management scheme for cloud-based vehicular IoT networks
The vehicular internet of things (VIoT) network is connecting smart commuters to elevate
traffic problems and effectiveness that help to improve driving conditions for vehicles. Every …
traffic problems and effectiveness that help to improve driving conditions for vehicles. Every …
Lightweight dynamic group rekeying for low-power wireless networks in IIoT
E Uchiteleva, AR Hussein… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In this article, a novel pseudorandom key chaining (PRKC) algorithm is introduced and
evaluated. This lightweight symmetric scheme enables a transmission-triggered time …
evaluated. This lightweight symmetric scheme enables a transmission-triggered time …
ITrust—A trustworthy and efficient mapping scheme in elliptic curve cryptography
Recently, many platforms have outsourced tasks to numerous smartphone devices known
as Mobile Crowd-sourcing System (MCS). The data is collected and transferred to the …
as Mobile Crowd-sourcing System (MCS). The data is collected and transferred to the …