A flexible and efficient authentication and secure data transmission scheme for IoT applications

D Fang, Y Qian, RQ Hu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… other schemes in terms of security features, computational overhead, … security by consideration
of heterogeneous IoT devices. With the higher proportion of resource limited IoT devices, …

Secure transmission for SWIPT IoT systems with full-duplex IoT devices

D Xu, H Zhu - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
IoT devices distributed in a wide area [6]. Compared to con… That is to say, SWIPT enables
IoT devices to harvest energy … transmission and energy harvesting at the IoT devices [11]. …

A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges

SN Mahapatra, BK Singh, V Kumar - Arabian Journal for Science and …, 2020 - Springer
… the secure transmission of data in IoT and investigate the recent approaches in IoT security
… We present a taxonomy model for the secure transmission in IoT security which includes …

Research on secure transmission and storage of energy IoT information based on Blockchain

H Rui, L Huan, H Yang, Z YunHao - Peer-to-Peer Networking and …, 2020 - Springer
Transmission security is achieved by encrypting the … IoT device and the service center and
the IoT device. By separating the IoT device authorization authentication from the IoT device

A review of algorithms for secure data transmission in iot devices

A Zahoor, S Kaur - … Disruptive Technologies: Proceedings of MIDAS 2020, 2021 - Springer
… In this paper, we used Raspberry Pi as IoT device and … However, we know that IoT devices
need light ciphers as we are … the above defined algorithms for IoT devices. In the running time …

Secure healthcare data aggregation and transmission in IoT—A survey

A Ullah, M Azeem, H Ashraf, AA Alaboudi… - IEEE …, 2021 - ieeexplore.ieee.org
… aggregate and transmitsecure healthcare data collection schemes is yet contributed in
literature. This paper presents a survey of different data collection and secure transmission

A distributed security mechanism for resource-constrained IoT devices

J King, AI Awad - Informatica, 2016 - informatica.si
secure communication. This paper provides a distributed security mechanism that targets
Class-0 IoT devices… with connection times as slow as 24 seconds for a secure transmission [25]…

Hybrid Internet of Things (IoT) data transmission security corresponding to device verification

MS Jian, JMT Wu - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
… Based on the identification, the security of data transmission between each IoT device and
… Besides, each IoT device could be managed individually. After identification, all IoT devices

[HTML][HTML] Secure transmission technique for data in IoT edge computing infrastructure

R Sharma, R Arya - Complex & Intelligent Systems, 2022 - Springer
… In this paper, a data transmission technique has been proposed, which will provide … In this
paper, a secure data transmission technique has been introduced for IoT infrastructure. In this …

An encryption-based secure framework for data transmission in IoT

S Chaudhry - 2018 7th International Conference on Reliability …, 2018 - ieeexplore.ieee.org
… The IoT devices required privacy, validation, get to control, honesty keeping in mind the end
… current security challenges on cell phones and IoT devices. We presented different security