Internet of drones security: Taxonomies, open issues, and future directions

A Derhab, O Cheikhrouhou, A Allouch, A Koubaa… - Vehicular …, 2023 - Elsevier
Drones have recently become one of the most important technological breakthroughs. They
have opened the horizon for a vast array of applications and paved the way for a diversity of …

A survey on security and cryptographic perspective of Industrial-Internet-of-Things

N Mishra, SKH Islam, S Zeadally - Internet of Things, 2023 - Elsevier
Abstract The Industrial-Internet-of-Things (IIoT) powers several applications in the modern
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …

Fortifying the blockchain: A systematic review and classification of post-quantum consensus solutions for enhanced security and resilience

J Gomes, S Khan, D Svetinovic - IEEE Access, 2023 - ieeexplore.ieee.org
The inherent security and computational demands of classical consensus protocols are
often presumed impervious to various forms of attack. However, quantum computing …

A comparative study of post-quantum cryptographic algorithm implementations for secure and efficient energy systems monitoring

GB Satrya, YM Agus, AB Mnaouer - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) has assumed a pivotal role in the advancement of
communication technology and in our daily lives. However, an IoT system such as a smart …

Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices

P Rewal, M Singh, D Mishra, K Pursharthi… - Journal of Information …, 2023 - Elsevier
Mobile-based web apps have gained popularity among phone devices because of the rapid
advancement of mobile communication and equipment capabilities. Users may utilize their …

Decentralized lattice-based device-to-device authentication for the edge-enabled IoT

A Shahidinejad, J Abawajy - IEEE Systems Journal, 2023 - ieeexplore.ieee.org
In this article, we present a novel and decentralized authentication and key exchange
protocol for device-to-device (D2D) communications in the Internet of Things (IoT). The …

Hybrid Quantum Computing and Decision Tree-Based Data Mining for Improved Data Security

K Sudharson, NS Usha, G Babu… - 2023 7th …, 2023 - ieeexplore.ieee.org
Data mining and quantum computing have become potent methods for analyzing massive
datasets and gaining insightful conclusions. However, conventional techniques for data …

Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data

M SaberiKamarposhti, KW Ng, FF Chua, J Abdullah… - Heliyon, 2024 - cell.com
As healthcare systems transition into an era dominated by quantum technologies, the need
to fortify cybersecurity measures to protect sensitive medical data becomes increasingly …

Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things

AMN Gilmolk, MR Aref - International Journal of Computational Intelligence …, 2024 - Springer
Recently, the field of lightweight cryptography (LWC) has emerged in response to the
security needs of low-cost, widely used technology. It is essential to implement an encryption …

AEKA: FPGA Implementation of Area-Efficient Karatsuba Accelerator for Ring-Binary-LWE-based Lightweight PQC

T Bao, P He, J Xie, HS Jacinto - ACM Transactions on Reconfigurable …, 2024 - dl.acm.org
Lightweight PQC-related research and development have gradually gained attention from
the research community recently. Ring-Binary-Learning-with-Errors (RBLWE)-based …