Forensic analysis on internet of things (IoT) device using machine-to-machine (M2M) framework

MS Mazhar, Y Saleem, A Almogren, J Arshad… - Electronics, 2022 - mdpi.com
The versatility of IoT devices increases the probability of continuous attacks on them. The
low processing power and low memory of IoT devices have made it difficult for security …

Secure elliptic curve crypto-processor for real-time IoT applications

S Di Matteo, L Baldanzi, L Crocetti, P Nannipieri… - Energies, 2021 - mdpi.com
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and
low latencies are required, along with security requirements to protect the large number of …

A generalized framework for elliptic curves based PRNG and its utilization in image encryption

SH AbdElHaleem, SK Abd-El-Hafiz, AG Radwan - Scientific Reports, 2022 - nature.com
In the last decade, Elliptic Curves (ECs) have shown their efficacy as a safe fundamental
component in encryption systems, mainly when used in Pseudorandom Number Generator …

An efficient authenticated elliptic curve cryptography scheme for multicore wireless sensor networks

ET Oladipupo, OC Abikoye, AL Imoize… - IEEE …, 2023 - ieeexplore.ieee.org
The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their
communication has spurred various researchers to come up with various WSN models …

Quality of Service aware secure data transmission model for Internet of Things assisted wireless sensor networks

P Velmurugadass, S Dhanasekaran… - Transactions on …, 2023 - Wiley Online Library
Wireless sensor networks (WSNs) are the most critical networks in developing various
Internet of Things (IoT) based applications. However, such intelligent devices have …

Secure advance metering infrastructure protocol for smart grid power system enabled by the Internet of Things

PD Halle, S Shiyamala - Microprocessors and Microsystems, 2022 - Elsevier
Abstract The incorporation of Advanced Metering Infrastructure (AMI) into Smart Grid
applications has piqued the interest of Internet of Things (IoT) experts, who have aided smart …

[Retracted] Application of Internet of Things and Edge Computing Technology in Sports Tourism Services

B Zheng, Z Mei, L Hou, S Qiu - Security and Communication …, 2021 - Wiley Online Library
Aiming at the problems of long retrieval time of sports tourism data, high integration error of
sports tourism data, and high energy consumption of sports tourism service management in …

Design of adaptive-robust controller for multi-state synchronization of chaotic systems with unknown and time-varying delays and its application in secure …

AA Kekha Javan, A Shoeibi, A Zare, N Hosseini Izadi… - Sensors, 2021 - mdpi.com
In this paper, the multi-state synchronization of chaotic systems with non-identical, unknown,
and time-varying delay in the presence of external perturbations and parametric …

Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes

S Ali, F Anwer - International Journal of Information Technology, 2024 - Springer
IoTs are increasingly gaining popularity and prevalence due to their extensive applications
across various domains. They gather data from the real environment and transmit it through …

A Real‐Time Biometric Encryption Scheme Based on Fuzzy Logic for IoT

M Moradi, M Moradkhani, MB Tavakoli - Journal of Sensors, 2022 - Wiley Online Library
When milliards of smart devices are connected to the Internet using the Internet of Things
(IoT), robust security methods are required to deliver current information to the objects …