Internet of Things backdoors: Resource management issues, security challenges, and detection methods
Abstract Internet of Things (IoT) technology is one of the successful and interesting products
of ubiquitous wireless networks that beneficiate human life with the make use of smart …
of ubiquitous wireless networks that beneficiate human life with the make use of smart …
Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions
Radio frequency identification (RFID) has been considered one of the imperative
requirements for implementation of Internet-of-Things applications. It helps to solve the …
requirements for implementation of Internet-of-Things applications. It helps to solve the …
IoT security: A layered approach for attacks & defenses
Internet of Things (IoT) has been a massive advancement in the Information and
Communication Technology (ICT). It is projected that over 50 billion devices will become …
Communication Technology (ICT). It is projected that over 50 billion devices will become …
A double PUF-based RFID identity authentication protocol in service-centric internet of things environments
The rapid development of sensing, automation and communication technologies has led to
the proliferation of the Internet of Things (IoT), providing recognized promising opportunities …
the proliferation of the Internet of Things (IoT), providing recognized promising opportunities …
[PDF][PDF] Security challenges facing IoT layers and its protective measures
TA Rao, EU Haq - International Journal of Computer Applications, 2018 - researchgate.net
ABSTRACT The Internet of Things (IoT) is profoundly affecting people's routine lives in
various fields ranging from petite wearable devices to enormous commercial systems and it …
various fields ranging from petite wearable devices to enormous commercial systems and it …
Providing destructive privacy and scalability in RFID systems using PUFs
M Akgün, MU Çaǧlayan - Ad Hoc Networks, 2015 - Elsevier
Abstract Internet of Things (IoT) emerges as a global network in which any things (including
humans and the real world things) having unique identifier can communicate each other …
humans and the real world things) having unique identifier can communicate each other …
A quadratic residue-based RFID authentication protocol with enhanced security for TMIS
Z Zhou, P Wang, Z Li - Journal of ambient intelligence and humanized …, 2019 - Springer
Telecare medicine information system (TMIS) is one of most important RFID applications in
the healthcare field. Li et al. proposed a RFID tag authentication protocol with privacy …
the healthcare field. Li et al. proposed a RFID tag authentication protocol with privacy …
: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications
The location-based services provide an interesting combination of cyber and physical
worlds. However, they can also threaten the users' privacy. Existing privacy preserving …
worlds. However, they can also threaten the users' privacy. Existing privacy preserving …
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
P Urien, S Piramuthu - Decision Support Systems, 2014 - Elsevier
Unless specifically designed for its prevention, none of the existing RFID authentication
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …
Security in IoT layers: Emerging challenges with countermeasures
In a short timeframe, Internet of Things (IoT) has gained a lot of traction and has entrenched
itself as a global technology. IoT devices are typically integrated with machine learning and …
itself as a global technology. IoT devices are typically integrated with machine learning and …