Internet of things security: challenges and key issues

M Azrour, J Mabrouki, A Guezzaz… - Security and …, 2021 - Wiley Online Library
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …

SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication

T Alladi, G Bansal, V Chamola… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) are becoming very popular nowadays due to the
emergence of application areas such as the Internet of Drones (IoD). They are finding wide …

[HTML][HTML] Joint wireless power transfer and task offloading in mobile edge computing: a survey

E Mustafa, J Shuja, SK uz Zaman, AI Jehangiri, S Din… - Cluster …, 2022 - Springer
The promising technique of Wireless Power Transfer (WPT) to end devices and sensors has
gained the attention of researchers recently. Mobile edge computing (MEC) is also …

A reliable network intrusion detection approach using decision tree with enhanced data quality

A Guezzaz, S Benkirane, M Azrour… - Security and …, 2021 - Wiley Online Library
Due to the recent advancements in the Internet of things (IoT) and cloud computing
technologies and growing number of devices connected to the Internet, the security and …

[HTML][HTML] Reinforcement learning for intelligent online computation offloading in wireless powered edge networks

E Mustafa, J Shuja, K Bilal, S Mustafa, T Maqsood… - Cluster …, 2023 - Springer
The method of charging mobile devices with wireless power transfer (WPT) from the base
station (BS) integrated with mobile edge computing (MEC) increases the potential of MEC …

A secure and lightweight drones-access protocol for smart city surveillance

MW Akram, AK Bashir, S Shamshad… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The rising popularity of ICT and the Internet has enabled Unmanned Aerial Vehicle (UAV) to
offer advantageous assistance to Vehicular Ad-hoc Network (VANET), realizing a relay …

Designing secure and lightweight user access to drone for smart city surveillance

S Hussain, K Mahmood, MK Khan, CM Chen… - Computer Standards & …, 2022 - Elsevier
Abstract The Internet of drones (IoD) is a very useful application of the Internet of things (IoT)
and it can help the daily life comfort through various functions including the smart city …

Identity and aggregate signature-based authentication protocol for IoD deployment military drone

SU Jan, HU Khan - IEEE Access, 2021 - ieeexplore.ieee.org
With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor
system, drone technology has fascinated researchers in the field of network security. It is of …

Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography

K Mansoor, A Ghani, SA Chaudhry, S Shamshirband… - Sensors, 2019 - mdpi.com
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the
underlying open architecture for communication between the RFID devices may lead to …

ALAM: Anonymous lightweight authentication mechanism for SDN-enabled smart homes

W Iqbal, H Abbas, P Deng, J Wan… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The smart connected devices are the first choice of cybercriminals for spreading spy wares
and different security attacks. The current security standards and protocols for Internet of …