[PDF][PDF] Privacy-preserving authentication and key exchange mechanisms in internet of things applications

G Singh - 2021 - researchgate.net
Research Area: The Internet of Things (IoT) technology has emerged as the leader in
simplifying lives. The IoT is rapidly adopted by the various industries for faster data …

Resource efficient metering scheme for protecting SoC FPGA device and IPs in IOT applications

J Kokila, N Ramasubramanian… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Due to the fact that most of the functions in SoC are handled by the intellectual property (IP)
blocks, the CPU plays a minimum role in scheduling the functionality of the IP blocks …

A location‐aware physical unclonable function and Chebyshev map‐based mutual authentication mechanism for internet of surveillance drones

AS Nair, SM Thampi - Concurrency and Computation: Practice …, 2023 - Wiley Online Library
The primary concern for securing the Internet of Drones (IoD) is authentication. Drone
location is a vital information that must be verified before a secure communication link with …

Analysis of ECDSA's Computational Impact on IoT Network Performance

J Clark, F Ali - Proceedings of the 2023 ACM Southeast Conference, 2023 - dl.acm.org
The Internet of Things (IoT) is transforming the world. On the one hand, its rapid integration
into many systems is making automation easier, but on the other hand dependence of many …

Towards a holistic framework for secure, privacy-aware, and trustworthy internet of things using resource-efficient cryptographic schemes

M Hossain - 2018 - search.proquest.com
The increased deployment of Internet of Things (IoT) based systems make smart devices
target for malicious attacks. These devices can also be used as tools for committing crimes …

PUFloc: PUF and location based hierarchical mutual authentication protocol for surveillance drone networks

AS Nair, SM Thampi - Inernational Conference on Ubiquitous Security, 2021 - Springer
The security hazards in the digital sky of drones urges for lightweight and secure defense
mechanisms against several cyber-attacks on drone networks. The main issues in a …

A two-flights mutual authentication for energy-constrained iot devices

Y Yilmaz, B Halak - 2019 IEEE 4th International Verification …, 2019 - ieeexplore.ieee.org
Authentication is a fundamental part of essential security operations and is a cornerstone for
the Internet of Things (IoT) security. In this work an energy-efficient and secure mutual …

HCRO-LKSM: A Lightweight Key Sharing and Management Protocol Based on HCRO-PUF for IoT Devices

W Zhenyu, D Ding, G Yang… - 2022 IEEE 24th Int Conf …, 2022 - ieeexplore.ieee.org
The remarkable growth of the Internet of Things (IoT) has paved the way for the
interconnection of a wide variety of mobile devices. To protect data confidentiality and user …

Home IoT Authority Control Method Based on DID Auth

JH Choi, JH Im, HJ Song, KH Kim - … International Conference on …, 2023 - ieeexplore.ieee.org
The Home IoT device market is expanding rapidly, which has led to the increasing adoption
of these devices in the home. However, IoT devices have long been challenged by various …

Trillion Sensors Security

P Cui, U Guin, M Tehranipoor - Emerging Topics in Hardware Security, 2020 - Springer
The advancement of ubiquitous computing in the Internet of Things (IoT) and Cyber-Physical
Systems (CPS) applications boosted the number of connected devices increased in the last …