A comprehensive study of security and cyber-security risk management within e-Health systems: Synthesis, analysis and a novel quantified approach

S Ksibi, F Jaidi, A Bouhoula - Mobile Networks and Applications, 2023 - Springer
Abstract Internet of Things (IoT) applications are among the major trends of nowadays.
Billions of connected devices are creating great business profits and performing a multitude …

Prisec: Comparison of symmetric key algorithms for iot devices

DAF Saraiva, VRQ Leithardt, D de Paula… - Sensors, 2019 - mdpi.com
With the growing number of heterogeneous resource-constrained devices connected to the
Internet, it becomes increasingly challenging to secure the privacy and protection of data …

[PDF][PDF] An extensive review on IoT security challenges and LWC implementation on tiny hardware for node level security evaluation

S Sutar, P Mekala - International Journal of Next-Generation …, 2022 - researchgate.net
Internet-of-Things (IoT) offers a novel intelligent ecosystem that consists of various physical
objects interconnected via the internet, which draws the attention of researchers …

The role of IoT in digital governance

A Khan, NZ Jhanjhi, M Humayun… - … Recent Technologies for …, 2020 - igi-global.com
The acronym IoT stands for internet of things. The IoT ecosystem can be envisioned as a set
of physical electronic devices embedded with intelligence, connected through a network …

Secure IoT e-Health applications using VICINITY framework and GDPR guidelines

M Koutli, N Theologou, A Tryferidis… - … Computing in Sensor …, 2019 - ieeexplore.ieee.org
In this work we analyze the security requirements and challenges of e-Health Internet of
Things (IoT) applications and propose a complete architecture to address them. This …

Internet of Things fermatean fuzzy CRITIC testing procedure for new normal

M Kabak, S Aydın, A Aktaş - … Conference on Intelligent and Fuzzy Systems, 2022 - Springer
Digital disruption was crucial to corporate success even before COVID-19 pandemic. The
need for speed digitization has grown even more pressing since the pandemic broke out …

[PDF][PDF] Comparative analysis of secured hash algorithms for blockchain technology and internet of things

M Parmar, HJ Kaur - International Journal of Advanced …, 2021 - pdfs.semanticscholar.org
Information Security and Management. To test the credibility, reliability of metadata
exchanged between the sender and the recipient party of IoT applications different …

[PDF][PDF] Modified round function of SIMECK 32/64 block cipher

PC Encarnacion, BD Gerardo… - Int. J. Adv. Trends …, 2020 - academia.edu
ABSTRACT Lightweight Block Cipher's (LBC) various algorithms need to meet the security
requirements for all resource-constrained devices and Internet of Things (IoT) technologies …

[PDF][PDF] Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence.

AH Farea, OH Alhazmi, K Kucuk - Computers, Materials & …, 2024 - cdn.techscience.cn
While emerging technologies such as the Internet of Things (IoT) have many benefits, they
also pose considerable security challenges that require innovative solutions, including those …

[PDF][PDF] An efficient lightweight key exchange algorithm for internet of things applications

FK Ali, S Mathew - International Journal of Electrical and Computer …, 2022 - academia.edu
Internet of things (IoT) gained wide popularity in recent years, and this is proved by
tremendous increase in use of IoT applications worldwide. Distributed IoT applications can …