Architectural threats to security and privacy: a challenge for internet of things (IoT) applications

Y Khan, MBM Su'ud, MM Alam, SF Ahmad, NA Salim… - Electronics, 2022 - mdpi.com
The internet of things (IoT) is one of the growing platforms of the current era that has
encircled a large population into its domain, and life appears to be useless without adopting …

Near-field communication sensors

Z Cao, P Chen, Z Ma, S Li, X Gao, R Wu, L Pan, Y Shi - Sensors, 2019 - mdpi.com
Near-field communication is a new kind of low-cost wireless communication technology
developed in recent years, which brings great convenience to daily life activities such as …

A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …

Cyber threats to industrial IoT: a survey on attacks and countermeasures

K Tsiknas, D Taketzis, K Demertzis, C Skianis - IoT, 2021 - mdpi.com
In today's Industrial Internet of Things (IIoT) environment, where different systems interact
with the physical world, the state proposed by the Industry 4.0 standards can lead to …

Static analysis for discovering IoT vulnerabilities

P Ferrara, AK Mandal, A Cortesi, F Spoto - International Journal on …, 2021 - Springer
Abstract The Open Web Application Security Project (OWASP), released the “OWASP Top
10 Internet of Things 2018” list of the high-priority security vulnerabilities for IoT systems. The …

Analysis of lightweight cryptographic algorithms on iot hardware platform

M El-Hajj, H Mousawi, A Fadlallah - Future Internet, 2023 - mdpi.com
Highly constrained devices that are interconnected and interact to complete a task are being
used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems …

An improved lightweight PUF–PKI digital certificate authentication scheme for the Internet of Things

Z Siddiqui, J Gao, MK Khan - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Prosanta and Biplab presented a lightweight two-factor authentication scheme for the
Internet of Things (IoT) devices based on the physical unclonable function (PUF). Their …

[HTML][HTML] MQTT based secure transport layer communication for mutual authentication in IoT network

V Shilpa, A Vidya, S Pattar - Global Transitions Proceedings, 2022 - Elsevier
Recent advancements in the communication protocols and the networking technologies
have enabled connectivity of a wide range of objects, resulting in the Internet of Things (IoT) …

RETRACTED ARTICLE: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers

SS Rani, JA Alzubi, SK Lakshmanaprabu… - Multimedia Tools and …, 2020 - Springer
The ever-growing advancement in communication innovation of modern smart objects
carries with it a new era of improvement for the Internet of Things (IoT) based networks. The …

A physically secure, lightweight three-factor and anonymous user authentication protocol for IoT

Z Liu, C Guo, B Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things has remarkable effects in human's daily life. It is important for users and
sensors to securely access data collected by low-cost sensors via Internet in real-time IoT …