Security and privacy for low power iot devices on 5g and beyond networks: Challenges and future directions
The growth in the use of small sensor devices, commonly known as the Internet of Things
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …
Assimilation of 3D printing, Artificial Intelligence (AI) and Internet of Things (IoT) for the construction of eco-friendly intelligent homes: An explorative review
The construction industry is witnessing a transformative shift towards sustainable and
intelligent housing solutions driven by advancements in 3D printing, Artificial Intelligence …
intelligent housing solutions driven by advancements in 3D printing, Artificial Intelligence …
Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach
Internet of Things (IoT) devices are increasingly found in everyday homes, providing useful
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …
Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
VO Nyangaresi - Journal of Systems Architecture, 2022 - Elsevier
The communication channel between the smart home devices and the remote users is
susceptible to numerous privacy and security compromise attacks. To address these issues …
susceptible to numerous privacy and security compromise attacks. To address these issues …
[HTML][HTML] Using data mining techniques to explore security issues in smart living environments in Twitter
JR Saura, D Palacios-Marqués… - Computer …, 2021 - Elsevier
In present-day in consumers' homes, there are millions of Internet-connected devices that
are known to jointly represent the Internet of Things (IoT). The development of the IoT …
are known to jointly represent the Internet of Things (IoT). The development of the IoT …
Vulnerability studies and security postures of IoT devices: A smart home case study
Internet-of-Things (IoT) technology has revolutionized our daily lives in many ways-whether
it is the way we conduct our day-to-day activities inside our home, or the way we control our …
it is the way we conduct our day-to-day activities inside our home, or the way we control our …
Lightweight three-factor-based privacy-preserving authentication scheme for iot-enabled smart homes
S Yu, N Jho, Y Park - IEEE Access, 2021 - ieeexplore.ieee.org
Smart homes are an emerging paradigm of Internet of Things (IoT) in which users can
remotely control various home devices via the internet anytime and anywhere. However …
remotely control various home devices via the internet anytime and anywhere. However …
A security protocol for route optimization in DMM-based smart home IoT networks
Smart home networks have been recognized as one of its representative important
applications in the forthcoming 5G era. It is also expected that in 5G networks, future smart …
applications in the forthcoming 5G era. It is also expected that in 5G networks, future smart …
Are you spying on me?{Large-Scale} analysis on {IoT} data exposure through companion apps
Recent research has highlighted privacy as a primary concern for IoT device users.
However, due to the challenges in conducting a large-scale study to analyze thousands of …
However, due to the challenges in conducting a large-scale study to analyze thousands of …
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …