A survey on privacy and security of Internet of Things
Abstract Internet of Things (IoT) has fundamentally changed the way information technology
and communication environments work, with significant advantages derived from wireless …
and communication environments work, with significant advantages derived from wireless …
A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities
Abstract Deployments of Cyber Physical Systems (CPSs) in smart cities are poised to
significantly improve healthcare, transportation services, utilities, safety, and environmental …
significantly improve healthcare, transportation services, utilities, safety, and environmental …
IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …
including personal health care, environmental monitoring, home automation, smart mobility …
Secured IIoT against trust deficit-A flexi cryptic approach
This research allows the secure surveillance approach for the Internet of Things (IoT)
methodology to be developed by integrating wireless signalling and image encryption …
methodology to be developed by integrating wireless signalling and image encryption …
FPGA realization of a reversible data hiding scheme for 5G MIMO-OFDM system by chaotic key generation-based paillier cryptography along with LDPC and its side …
Multiple-Input and Multiple-Output (MIMO) technology is a significant and timely subject,
which is highly motivated by the needs of 5G wireless communications. Data transmission …
which is highly motivated by the needs of 5G wireless communications. Data transmission …
EGCrypto: a low-complexity elliptic galois cryptography model for secure data transmission in IoT
In recent years, data security has been a challenging endeavor, especially when the data is
being transmitted every second. Internet of Things (IoT) involves continuously sending data …
being transmitted every second. Internet of Things (IoT) involves continuously sending data …
[PDF][PDF] Low Area PRESENT Cryptography in FPGA Using TRNGPRNG Key Generation
T Kowsalya, RG Babu… - … Materials & Continua, 2021 - researchgate.net
Lightweight Cryptography (LWC) is widely used to provide integrity, secrecy and
authentication for the sensitive applications. However, the LWC is vulnerable to various …
authentication for the sensitive applications. However, the LWC is vulnerable to various …
Security of internet of things edge devices
Z Lv - Software: Practice and Experience, 2021 - Wiley Online Library
The purpose of the study is to meet the more needs of the future social development for the
Internet of things (IoT) and make IoT better provide more convenience for people and reduce …
Internet of things (IoT) and make IoT better provide more convenience for people and reduce …
Improved power/EM side-channel attack resistance of 128-bit AES engines with random fast voltage dithering
This paper demonstrates the improved power and electromagnetic (EM) side-channel attack
(SCA) resistance of 128-bit Advanced Encryption Standard (AES) engines in 130-nm CMOS …
(SCA) resistance of 128-bit Advanced Encryption Standard (AES) engines in 130-nm CMOS …
Current research trends in IoT security: a systematic mapping study
JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …