Internet of Things backdoors: Resource management issues, security challenges, and detection methods

S Hashemi, M Zarei - Transactions on Emerging …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) technology is one of the successful and interesting products
of ubiquitous wireless networks that beneficiate human life with the make use of smart …

Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions

P Gope, J Lee, TQS Quek - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Radio frequency identification (RFID) has been considered one of the imperative
requirements for implementation of Internet-of-Things applications. It helps to solve the …

IoT security: A layered approach for attacks & defenses

MM Ahemd, MA Shah, A Wahid - 2017 international conference …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) has been a massive advancement in the Information and
Communication Technology (ICT). It is projected that over 50 billion devices will become …

A double PUF-based RFID identity authentication protocol in service-centric internet of things environments

W Liang, S Xie, J Long, KC Li, D Zhang, K Li - Information Sciences, 2019 - Elsevier
The rapid development of sensing, automation and communication technologies has led to
the proliferation of the Internet of Things (IoT), providing recognized promising opportunities …

[PDF][PDF] Security challenges facing IoT layers and its protective measures

TA Rao, EU Haq - International Journal of Computer Applications, 2018 - researchgate.net
ABSTRACT The Internet of Things (IoT) is profoundly affecting people's routine lives in
various fields ranging from petite wearable devices to enormous commercial systems and it …

Providing destructive privacy and scalability in RFID systems using PUFs

M Akgün, MU Çaǧlayan - Ad Hoc Networks, 2015 - Elsevier
Abstract Internet of Things (IoT) emerges as a global network in which any things (including
humans and the real world things) having unique identifier can communicate each other …

A quadratic residue-based RFID authentication protocol with enhanced security for TMIS

Z Zhou, P Wang, Z Li - Journal of ambient intelligence and humanized …, 2019 - Springer
Telecare medicine information system (TMIS) is one of most important RFID applications in
the healthcare field. Li et al. proposed a RFID tag authentication protocol with privacy …

: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications

M Ghaffari, N Ghadiri, MH Manshaei… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The location-based services provide an interesting combination of cyber and physical
worlds. However, they can also threaten the users' privacy. Existing privacy preserving …

Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks

P Urien, S Piramuthu - Decision Support Systems, 2014 - Elsevier
Unless specifically designed for its prevention, none of the existing RFID authentication
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …

Security in IoT layers: Emerging challenges with countermeasures

SA Ansar, S Arya, S Aggrawal, S Saxena… - Computer Vision and …, 2023 - Springer
In a short timeframe, Internet of Things (IoT) has gained a lot of traction and has entrenched
itself as a global technology. IoT devices are typically integrated with machine learning and …