With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of …
EnOcean, a commonly used control protocol in smart lighting systems, provides authentication, as well as message integrity verification services, and can resist replay attack …
MA Mobarhan, M Salamah - Internet of Things, 2023 - Elsevier
Abstract Nowadays, Internet of Things systems connect several smart devices to provide required services. The IoT applications employ Machine Type Communications to meet the …
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications …
With the widespread use of Internet of Things (IoT) in various applications and several security vulnerabilities reported in them, the security requirements have become an integral …
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards and resource constraints as …
The Internet of Things (IoT) has become an important technology which permits different devices and machines to interconnect with each other using heterogeneous networks. The …
D He, Y Cai, S Zhu, Z Zhao, S Chan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The number of IoT devices is growing rapidly, and the interaction between devices and servers is also more frequent. However, IoT devices are often at the edge of the network …
D Fang, Y Qian, RQ Hu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) applications have been rapidly deployed into pervasive environment, where both challenges and opportunities abound. On the one hand, a large …