Secure data transmission framework for confidentiality in IoTs

NN Hurrah, SA Parah, JA Sheikh, F Al-Turjman… - Ad Hoc Networks, 2019 - Elsevier
The large-scale data exchange envisioned to occur in distributed IoTs is prone to raise
issues regarding privacy, confidentiality and authentication at the cyberspace level. This …

[HTML][HTML] A lightweight authentication scheme for 5G mobile communications: a dynamic key approach

R Pothumarti, K Jain, P Krishnan - Journal of Ambient Intelligence and …, 2021 - Springer
The security of modern IoT Industry 4.0, 5G, 6G, Mobile ad hoc (MANET), narrowband
internet of things (NB-IoT) and wireless sensory (WSN) networks and the autonomous …

Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks

R Montero-Canela, E Zambrano-Serrano… - Ad Hoc Networks, 2020 - Elsevier
Ad Hoc networks are considered essential elements of the Internet of Things (IoT), which is a
technological trend for innovative future applications. Since in IoT systems the devices are …

A secure data transmission framework for IoT enabled healthcare

S Saif, P Das, S Biswas, S Khan, MA Haq, V Kovtun - Heliyon, 2024 - cell.com
Abstract The Internet of Medical Things (IoMT) has transformed healthcare by connecting
medical devices, sensors, and patients, significantly improving patient care. However, the …

A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives

DS Bhatti, S Saleem, HN Lee, KI Kim - EURASIP Journal on Wireless …, 2024 - Springer
The expansion of wireless communication introduces security vulnerabilities, emphasizing
the essential need for secure systems that prioritize confidentiality, integrity, and other key …

A simple secret key generation by using a combination of pre-processing method with a multilevel quantization

M Yuliana, Wirawan, Suwadi - Entropy, 2019 - mdpi.com
Limitations of the computational and energy capabilities of IoT devices provide new
challenges in securing communication between devices. Physical layer security (PHYSEC) …

Gait-Watch: A Gait-based context-aware authentication system for smart watch via sparse coding

W Xu, Y Shen, C Luo, J Li, W Li, AY Zomaya - Ad Hoc Networks, 2020 - Elsevier
In recent years, wrist-worn smart devices such as smart wrist band and smart watch have
pervaded our everyday life. Under this trend, the security issue of these wearable devices …

[PDF][PDF] IoT security evolution: challenges and countermeasures review

AMA Abuagoub - International Journal of Communication Networks …, 2019 - academia.edu
Internet of Things (IoT) architecture, technologies, applications and security problems have
been recently addressed by a number of researchers. Basically, IoT adds internet …

An efficient key generation for the internet of things based synchronized quantization

M Yuliana, Wirawan, Suwadi - Sensors, 2019 - mdpi.com
One solution to ensure secrecy in the Internet of Things (IoT) is cryptography. However,
classical cryptographic systems require high computational complexity that is not …

Bipartite graph matching based secret key generation

H Liu, Y Wang, Y Ren, Y Chen - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
The physical layer secret key generation exploiting wireless channel reciprocity has
attracted considerable attention in the past two decades. On-going research have …