Blockchain integration for IoT-enabled V2X communications: a comprehensive survey, security issues and challenges

PM Rao, S Jangirala, S Pedada, AK Das, Y Park - IEEE Access, 2023 - ieeexplore.ieee.org
In V2X (vehicle-to-everything) communication, there is a two-way communication among the
vehicle (s) and other Internet of Things (IoT)-enabled smart devices around it that may …

A robust and efficient vector-based key management scheme for IoT networks

S Bettayeb, ML Messai, SM Hemam - Ad Hoc Networks, 2023 - Elsevier
Abstract Information and communication security is a critical concern in the rapid growth of
Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key …

A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security

AE Adeniyi, RG Jimoh, JB Awotunde - Computers and Electrical …, 2024 - Elsevier
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …

Evolutionary game and LGPSO for attack-defense confrontation analysis in WSN from macro perspective

N Liu, S Liu, WM Zheng - Expert Systems with Applications, 2025 - Elsevier
Wireless sensor network node security requires effective security mechanisms to protect the
security and reliability, so as to ensure that sensor nodes can operate normally and provide …

Design of secure and unique addressing with mutual authentication scheme in IoT networks

N Sharma, P Dhiman - Peer-to-Peer Networking and Applications, 2025 - Springer
Abstract The Internet of Things (IoT) is a network that connects physical objects, electronic
software, sensors, and actuators through the Internet. The widespread adoption of IoT has …

Authenticated key agreement for IoT network using HECC and CRT four co-primes

C Goswami, A Adhikari, SK Sahoo, P Sarkar - Peer-to-Peer Networking …, 2024 - Springer
Abstract Internet of Things (IoT) is an integral part of our daily lives and the security of these
devices is paramount. However, IoT devices are often resource constrained, requiring …

A secure addressing mutual authentication scheme for smart IoT home network

N Sharma, P Dhiman - Multimedia Tools and Applications, 2024 - Springer
Abstract Internet of Things (IoT) is an emerging technology with interconnected computing
devices and sensors that communicate and share data over a network. Smart home …

[HTML][HTML] Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol

R Almari, A Almosallam, S Almousa, S Alahmadi - Applied Sciences, 2024 - mdpi.com
Over the years, there has been a significant surge in the popularity of instant messaging
applications (IMAs). However, the message notification functionality in IMAs exhibits certain …

The Role of Microelectronics for Smart Cities, Smart Grids and Industry 5.0: Challenges, Solutions, and Opportunities

A Asilian, H Shahinzadeh, SM Zanjani… - 2023 13th Smart …, 2023 - ieeexplore.ieee.org
Microelectronics play a vital role in the next generation of Smart Cities (SCs), Smart Grids
(SGs) and Industry 5.0 due to their provision of computing power, storage capacity, and …

Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks

Z Liu, Y Luo - PeerJ Computer Science, 2023 - peerj.com
Background With the extensive application and continuous expansion of the Internet of
Things (IoT), the access of a large number of resource-limited nodes makes the IoT …