An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
Biometrics for internet-of-things security: A review
The large number of Internet-of-Things (IoT) devices that need interaction between smart
devices and consumers makes security critical to an IoT environment. Biometrics offers an …
devices and consumers makes security critical to an IoT environment. Biometrics offers an …
UDhashing: Physical unclonable function-based user-device hash for endpoint authentication
With IT consumerization, access control to remote system by endpoint user and endpoint
device is mandatory for security and privacy protection. Existing systems bind an end user …
device is mandatory for security and privacy protection. Existing systems bind an end user …
Security Framework for IOT devices against Cyber-attacks
A Tabassum, W Lebda - arXiv preprint arXiv:1912.01712, 2019 - arxiv.org
Internet of Things (IoT) is the interconnection of heterogeneous smart devices through the
Internet with diverse application areas. The huge number of smart devices and the …
Internet with diverse application areas. The huge number of smart devices and the …
Low-cost security for next-generation IoT networks
NA Anagnostopoulos, S Ahmad, T Arul… - ACM Transactions on …, 2020 - dl.acm.org
In recent years, the ubiquitous nature of Internet-of-Things (IoT) applications as well as the
pervasive character of next-generation communication protocols, such as the 5G …
pervasive character of next-generation communication protocols, such as the 5G …
Access control for implantable medical devices
C Camara, P Peris-Lopez… - … on Emerging Topics …, 2020 - ieeexplore.ieee.org
The telemetry incorporate in the new generation of Implantable Medical Devices (IMDs)
allows remote access and re-programming without interfering with the daily routine of their …
allows remote access and re-programming without interfering with the daily routine of their …
Bio-Integrated Hybrid TESLA: A Fully Symmetric Lightweight Authentication Protocol
The rapid integration of IoT devices into everyday decision-making processes underscores
the need for continuous user authentication and data integrity checking during network …
the need for continuous user authentication and data integrity checking during network …
QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks
MM Mathews, V Panchami - Journal of Information Security and …, 2024 - Elsevier
Delay tolerant networks supporting heterogeneous communication are a promising network
architecture solution that can meet today's communication requirements involving nodes in …
architecture solution that can meet today's communication requirements involving nodes in …
A novel IoT sensor authentication using HaLo extraction method and memory chip variability
H Gordon, T Lyp, C Kimbro, S Tehranipoor - Discover Internet of Things, 2021 - Springer
Since the inception of encrypted messages thousands of years ago, mathematicians and
scientists have continued to improve encryption algorithms in order to create more secure …
scientists have continued to improve encryption algorithms in order to create more secure …
A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication
Access control is already an integral part of the Internet of Things (IoT) to prevent
unauthorized use of systems. However, in the post-pandemic world, contactless …
unauthorized use of systems. However, in the post-pandemic world, contactless …