Secure data transmission framework for confidentiality in IoTs
The large-scale data exchange envisioned to occur in distributed IoTs is prone to raise
issues regarding privacy, confidentiality and authentication at the cyberspace level. This …
issues regarding privacy, confidentiality and authentication at the cyberspace level. This …
[HTML][HTML] A lightweight authentication scheme for 5G mobile communications: a dynamic key approach
R Pothumarti, K Jain, P Krishnan - Journal of Ambient Intelligence and …, 2021 - Springer
The security of modern IoT Industry 4.0, 5G, 6G, Mobile ad hoc (MANET), narrowband
internet of things (NB-IoT) and wireless sensory (WSN) networks and the autonomous …
internet of things (NB-IoT) and wireless sensory (WSN) networks and the autonomous …
Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks
R Montero-Canela, E Zambrano-Serrano… - Ad Hoc Networks, 2020 - Elsevier
Ad Hoc networks are considered essential elements of the Internet of Things (IoT), which is a
technological trend for innovative future applications. Since in IoT systems the devices are …
technological trend for innovative future applications. Since in IoT systems the devices are …
A secure data transmission framework for IoT enabled healthcare
Abstract The Internet of Medical Things (IoMT) has transformed healthcare by connecting
medical devices, sensors, and patients, significantly improving patient care. However, the …
medical devices, sensors, and patients, significantly improving patient care. However, the …
A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives
The expansion of wireless communication introduces security vulnerabilities, emphasizing
the essential need for secure systems that prioritize confidentiality, integrity, and other key …
the essential need for secure systems that prioritize confidentiality, integrity, and other key …
A simple secret key generation by using a combination of pre-processing method with a multilevel quantization
Limitations of the computational and energy capabilities of IoT devices provide new
challenges in securing communication between devices. Physical layer security (PHYSEC) …
challenges in securing communication between devices. Physical layer security (PHYSEC) …
Gait-Watch: A Gait-based context-aware authentication system for smart watch via sparse coding
In recent years, wrist-worn smart devices such as smart wrist band and smart watch have
pervaded our everyday life. Under this trend, the security issue of these wearable devices …
pervaded our everyday life. Under this trend, the security issue of these wearable devices …
[PDF][PDF] IoT security evolution: challenges and countermeasures review
AMA Abuagoub - International Journal of Communication Networks …, 2019 - academia.edu
Internet of Things (IoT) architecture, technologies, applications and security problems have
been recently addressed by a number of researchers. Basically, IoT adds internet …
been recently addressed by a number of researchers. Basically, IoT adds internet …
An efficient key generation for the internet of things based synchronized quantization
One solution to ensure secrecy in the Internet of Things (IoT) is cryptography. However,
classical cryptographic systems require high computational complexity that is not …
classical cryptographic systems require high computational complexity that is not …
Bipartite graph matching based secret key generation
The physical layer secret key generation exploiting wireless channel reciprocity has
attracted considerable attention in the past two decades. On-going research have …
attracted considerable attention in the past two decades. On-going research have …