A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Intermittent computing: Challenges and opportunities

B Lucia, V Balaji, A Colin, K Maeng… - 2nd Summit on …, 2017 - drops.dagstuhl.de
The maturation of energy-harvesting technology and ultra-low-power computer systems has
led to the advent of intermittently-powered, batteryless devices that operate entirely using …

Survey on secure communication protocols for the Internet of Things

KT Nguyen, M Laurent, N Oualha - Ad Hoc Networks, 2015 - Elsevier
Abstract The Internet of Things or “IoT” defines a highly interconnected network of
heterogeneous devices where all kinds of communications seem to be possible, even …

Image Encryption Through Rössler System, PRNG S-Box and Recamán's Sequence

M ElBeltagy, W Alexan, A Elkhamry… - 2022 IEEE 12th …, 2022 - ieeexplore.ieee.org
This paper proposes a lightweight image encryption scheme that is based on 3 stages. The
first stage incorporates the use of the Rössler attractor for the Rössler system, the second …

A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …

Seda: Scalable embedded device attestation

N Asokan, F Brasser, A Ibrahim, AR Sadeghi… - Proceedings of the …, 2015 - dl.acm.org
Today, large numbers of smart interconnected devices provide safety and security critical
services for energy grids, industrial control systems, gas and oil search robots, home/office …

Image encryption through lucas sequence, s-box and chaos theory

W Alexan, M ElBeltagy… - 2021 8th NAFOSTED …, 2021 - ieeexplore.ieee.org
The need for image encryption schemes that are of low computation complexity is ever
increasing. Meanwhile, the use of chaotic functions and mathematical sequences to …

A blockchain-based secure key management scheme with trustworthiness in DWSNs

Y Tian, Z Wang, J Xiong, J Ma - IEEE Transactions on Industrial …, 2020 - ieeexplore.ieee.org
Dynamic wireless sensor networks (DWSNs) as an important means of industrial data
collection are a key part of industrial Internet of Things (IIoT), where security and reliability …

Lightweight and secure session-key establishment scheme in smart home environments

P Kumar, A Gurtov, J Iinatti, M Ylianttila… - IEEE Sensors …, 2015 - ieeexplore.ieee.org
The proliferation of current wireless communications and information technologies have
been altering humans lifestyle and social interactions-the next frontier is the smart home …

A lightweight biometrics based remote user authentication scheme for IoT services

PK Dhillon, S Kalra - Journal of Information Security and Applications, 2017 - Elsevier
User authentication is becoming crucial in the accelerating Internet of Things (IoT)
environment. With IoT several applications and services have been emerging in the areas …