Blockchain integration for IoT-enabled V2X communications: a comprehensive survey, security issues and challenges
In V2X (vehicle-to-everything) communication, there is a two-way communication among the
vehicle (s) and other Internet of Things (IoT)-enabled smart devices around it that may …
vehicle (s) and other Internet of Things (IoT)-enabled smart devices around it that may …
A robust and efficient vector-based key management scheme for IoT networks
Abstract Information and communication security is a critical concern in the rapid growth of
Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key …
Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key …
A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …
Evolutionary game and LGPSO for attack-defense confrontation analysis in WSN from macro perspective
Wireless sensor network node security requires effective security mechanisms to protect the
security and reliability, so as to ensure that sensor nodes can operate normally and provide …
security and reliability, so as to ensure that sensor nodes can operate normally and provide …
Design of secure and unique addressing with mutual authentication scheme in IoT networks
N Sharma, P Dhiman - Peer-to-Peer Networking and Applications, 2025 - Springer
Abstract The Internet of Things (IoT) is a network that connects physical objects, electronic
software, sensors, and actuators through the Internet. The widespread adoption of IoT has …
software, sensors, and actuators through the Internet. The widespread adoption of IoT has …
Authenticated key agreement for IoT network using HECC and CRT four co-primes
Abstract Internet of Things (IoT) is an integral part of our daily lives and the security of these
devices is paramount. However, IoT devices are often resource constrained, requiring …
devices is paramount. However, IoT devices are often resource constrained, requiring …
A secure addressing mutual authentication scheme for smart IoT home network
N Sharma, P Dhiman - Multimedia Tools and Applications, 2024 - Springer
Abstract Internet of Things (IoT) is an emerging technology with interconnected computing
devices and sensors that communicate and share data over a network. Smart home …
devices and sensors that communicate and share data over a network. Smart home …
[HTML][HTML] Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol
R Almari, A Almosallam, S Almousa, S Alahmadi - Applied Sciences, 2024 - mdpi.com
Over the years, there has been a significant surge in the popularity of instant messaging
applications (IMAs). However, the message notification functionality in IMAs exhibits certain …
applications (IMAs). However, the message notification functionality in IMAs exhibits certain …
The Role of Microelectronics for Smart Cities, Smart Grids and Industry 5.0: Challenges, Solutions, and Opportunities
Microelectronics play a vital role in the next generation of Smart Cities (SCs), Smart Grids
(SGs) and Industry 5.0 due to their provision of computing power, storage capacity, and …
(SGs) and Industry 5.0 due to their provision of computing power, storage capacity, and …
Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks
Z Liu, Y Luo - PeerJ Computer Science, 2023 - peerj.com
Background With the extensive application and continuous expansion of the Internet of
Things (IoT), the access of a large number of resource-limited nodes makes the IoT …
Things (IoT), the access of a large number of resource-limited nodes makes the IoT …