Collective memory for detecting nonconcurrent clones: A localized approach for global topology and identity tracing in IoT networks

J Xu, K Xing, C Zhang, S Zhang, Z Xu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Clone attack is considered as a severely destructive threat in Internet of Things (IoT),
because: 1) the attack may be easily launched due to the deficiency of hardware …

Trusted video streams in camera sensor networks

SJ Wöhnert, KH Wöhnert… - 2020 IEEE 18th …, 2020 - ieeexplore.ieee.org
Proof of integrity in produced video data by surveillance cameras requires active forensic
methods such as signatures, otherwise authenticity and integrity can be comprised and data …

TIGHTEN: A Two-Flight Mutual Authentication Protocol for Energy-Constrained Devices

Y Yilmaz, B Halak - … of Embedded Devices: Technologies, Protocols and …, 2021 - Springer
This chapter discusses the design, implementation and evaluation of a two-flight
authentication protocol. The latter combines the use of a lightweight symmetric cipher (RC5) …

A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home …

AM Gamundani, A Phillips, HN Muyingi - … 8-10, 2018, Proceedings, Part II, 2018 - Springer
Abstract Internet of Things (IoT) authentication for resource-constrained devices thrives
under lightweight solutions. The requirements of the lightweight solutions are that, they have …