Wireless sensor network security: A recent review based on state-of-the-art works
M Faris, MN Mahmud, MFM Salleh… - International Journal of …, 2023 - journals.sagepub.com
Wireless sensor networks (WSNs) are a major part of the telecommunications sector. WSN is
applied in many aspects, including surveillance battlefields, patient medical monitoring …
applied in many aspects, including surveillance battlefields, patient medical monitoring …
Coalescing novel QoS routing with fault tolerance for improving QoS parameters in wireless Ad-Hoc network using craft protocol
The information sharing on behalf of the delivery of the packet in the network router and the
original information that is share to the correct person is enabled for the analysis and then …
original information that is share to the correct person is enabled for the analysis and then …
[HTML][HTML] ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags
Abstract Internet of Things (IoT) technologies rapidly evolve and are used in many real-life
applications. One of the core technologies used in various IoT applications is Radio …
applications. One of the core technologies used in various IoT applications is Radio …
An authentication protocol for next generation of constrained Iot systems
S Rostampour, N Bagheri, Y Bendavid… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
With the exponential growth of connected Internet of Things (IoT) devices around the world,
security protection and privacy preservation have risen to the forefront of design and …
security protection and privacy preservation have risen to the forefront of design and …
Strengthening Internet of Things Security: Surveying Physical Unclonable Functions for Authentication, Communication Protocols, Challenges, and Applications
RA Alhamarneh, M Mahinderjit Singh - Applied Sciences, 2024 - mdpi.com
The spectrum of Internet of Things (IoT) applications is vast. It serves in various domains
such as smart homes, intelligent buildings, health care, emergency response, and many …
such as smart homes, intelligent buildings, health care, emergency response, and many …
URASP: An ultralightweight RFID authentication scheme using permutation operation
Due to low-cost, ease of use and convenience, Radio Frequency IDentification (RFID) is a
contactless technology that has become more and more promising for automatic …
contactless technology that has become more and more promising for automatic …
Toward designing a secure authentication protocol for IoT environments
Authentication protocol is a critical part of any application to manage the access control in
many applications. A former research recently proposed a lightweight authentication …
many applications. A former research recently proposed a lightweight authentication …
Secured authentication of RFID devices using lightweight block ciphers on FPGA platforms
Near Field Communication (NFC) has emerged as a pivotal wireless technology for short-
range data exchange between devices, including smartphones and wearables. Leveraging …
range data exchange between devices, including smartphones and wearables. Leveraging …
IMSC-EIoTD: Identity management and secure communication for edge IoT devices
The Internet of things (IoT) will accommodate several billions of devices to the Internet to
enhance human society as well as to improve the quality of living. A huge number of …
enhance human society as well as to improve the quality of living. A huge number of …
Lightweight Security for IoT
With the ever-increasing demand for IoT Devices which enable all objects to connect and
exchange information in applications such as healthcare applications, Industry 4.0, smart …
exchange information in applications such as healthcare applications, Industry 4.0, smart …