A review on the study on MQTT security challenge

F Chen, Y Huo, J Zhu, D Fan - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
With the enhancement of mobile network access capabilities, the application of the Internet
of Things has become increasingly widespread, and related research on the Internet of …

A survey on the Internet of Things security: State-of-art, architecture, issues and countermeasures

O Yousuf, RN Mir - Information & Computer Security, 2019 - emerald.com
Purpose Internet of Things (IoT) is a challenging and promising system concept and requires
new types of architectures and protocols compared to traditional networks. Security is an …

Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating …

F De Rango, G Potrino, M Tropea, P Fazio - Pervasive and Mobile …, 2020 - Elsevier
Security in the context of Internet of Things (IoT) is a critical challenge. The purpose of this
work is to model and evaluate a dynamic IoT security system based on a generic IoT edge …

Privacy preserving data aggregation with fault tolerance in fog-enabled smart grids

HM Khan, A Khan, F Jabeen, AU Rahman - Sustainable Cities and Society, 2021 - Elsevier
Smart grid (SG) seamlessly integrates electrical and communication network elements to
provide sustainable and affordable electricity in an efficient and stable manner. Smart …

Intuitive development to examine collaborative iot supply chain system underlying privacy and security levels and perspective powering through proactive blockchain

A Shahzad, K Zhang, A Gherbi - Sensors, 2020 - mdpi.com
Undoubtedly, the supply chain management (SCM) system is an important part of many
organizations worldwide; over time, the technologies used to manage a supply chain …

A Review on Machine Learning-based Malware Detection Techniques for Internet of Things (IoT) Environments

S Sasikala, S Janakiraman - Wireless Personal Communications, 2023 - Springer
Abstract Internet of Things (IoT) is the recent digital trend that connects the physical and
virtual world. The strong bonding between the people, objects, machines and the web are …

Mitigating DoS attacks in IoT EDGE Layer to preserve QoS topics and nodes' energy

F De Rango, M Tropea, P Fazio - IEEE INFOCOM 2020-IEEE …, 2020 - ieeexplore.ieee.org
Numerous challenges prevent the securing of IoT devices and their end-to-end
communication in an IoT environment. The IoT is currently widely used in many areas such …

[PDF][PDF] Towards secure smart campus: security requirements, attacks and counter measures

A Srhir, T Mazri, M Benbrahim - Indonesian Journal of Electrical …, 2023 - researchgate.net
The internet of things (IoT) has the potential to significantly impact growth due to the
technological revolution, widespread dissemination of information, and emergence of …

[PDF][PDF] Trust-based privacy for Internet of Things

V Suryani, S Sulistyo… - International …, 2016 - download.garuda.kemdikbud.go.id
Internet of Things or widely known as IOT makes smart objects become active participants in
the communication process between objects and their environment. IoT services that utilize …

[PDF][PDF] Digital signature & encryption implementation for increasing authentication, integrity, security and data non-repudiation

I Nurhaida, D Ramayanti, R Riesaputra - Int. Res. J. Comput. Sci, 2017 - academia.edu
A digital signature is a method that serves to improve the integrity, authenticity, non-
repudiation, and confidentiality of digital data in transmission. This paper discusses digital …