Realguard: A lightweight network intrusion detection system for IoT gateways

XH Nguyen, XD Nguyen, HH Huynh, KH Le - Sensors, 2022 - mdpi.com
Cyber security has become increasingly challenging due to the proliferation of the Internet of
things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the …

Unboxing fog security: a review of fog security and authentication mechanisms

N Kaliya, D Pawar - Computing, 2023 - Springer
Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a
strong need to bring connectivity to a very accessible level. To enable the execution of real …

Lightweight cryptographic hash functions: Design trends, comparative study, and future directions

S Windarta, S Suryadi, K Ramli, B Pranggono… - Ieee …, 2022 - ieeexplore.ieee.org
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …

A hypertuned lightweight and scalable LSTM model for hybrid network intrusion detection

A Bibi, GA Sampedro, A Almadhor, AR Javed, T Kim - Technologies, 2023 - mdpi.com
Given the increasing frequency of network attacks, there is an urgent need for more effective
network security measures. While traditional approaches such as firewalls and data …

Securing fog computing with a decentralised user authentication approach based on blockchain

O Umoren, R Singh, Z Pervez, K Dahal - Sensors, 2022 - mdpi.com
The use of low-cost sensors in IoT over high-cost devices has been considered less
expensive. However, these low-cost sensors have their own limitations such as the …

LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems

H Ali, I Ahmed - Computers & Security, 2024 - Elsevier
Fog computing is a new computing model with limited resources located near the Internet of
Things (IoT) devices to provide low transmission delay, mobility, and location awareness …

Blockchain-based secure authentication with improved performance for fog computing

O Umoren, R Singh, S Awan, Z Pervez, K Dahal - Sensors, 2022 - mdpi.com
Advancement in the Internet of Things (IoT) and cloud computing has escalated the number
of connected edge devices in a smart city environment. Having billions more devices has …

Efficient Braille Transformation for Secure Password Hashing

H Touil, N El Akkad, K Satori, NF Soliman… - IEEE …, 2024 - ieeexplore.ieee.org
In this work, we propose a novel approach to enhancing the security of passwords before
storing them in databases. Our method utilizes Braille transformation to encrypt the …

Fog-based single sign-on authentication protocol for electronic healthcare applications

S Mookherji, V Odelu, R Prasath… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Increasing use of electronic healthcare (eHealth) services demands efficient and secure
solutions. Such solutions need to ensure the prevention of unauthorized access to the …

Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things

S Windarta, S Suryadi, K Ramli, AA Lestari… - IEEE …, 2023 - ieeexplore.ieee.org
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …