A survey on privacy and security of Internet of Things

MM Ogonji, G Okeyo, JM Wafula - Computer Science Review, 2020 - Elsevier
Abstract Internet of Things (IoT) has fundamentally changed the way information technology
and communication environments work, with significant advantages derived from wireless …

Home Automation and RFID‐Based Internet of Things Security: Challenges and Issues

H Fatima, HU Khan, S Akbar - Security and Communication …, 2021 - Wiley Online Library
Internet of Things (IoT) protection refers to the software field related to securing the Internet
of Things and associated linked devices and systems. The IoT is a system of interconnected …

[PDF][PDF] Design of lightweight authentication protocol for fog enabled internet of things-a centralized authentication framework

U Verma, D Bhardwaj - Int. J. Commun. Netw. Inf. Secur, 2020 - academia.edu
Internet is a large network of networks that spans the entire globe. Internet is playing
indispensable role in our daily lives. The physical things are connected to internet with the …

Industrial IoT (IIOT): Security threats and countermeasures

R Kumar, B Kandpal, V Ahmad - … International Conference on …, 2023 - ieeexplore.ieee.org
IoT makes a system of intelligent machines, objects, people, and/or other things internet
connected, opening them up to major dangers and attacks. Research analysis of IoT …

IoT-Paradigm: Evolution Challenges and Proposed Solutions

M Al Rawajbeh, S AlZu'bi… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The tremendous increase of using intelligent devices brought by the Internet of Things
technology was a success to change the shape and nature of provided services in the digital …

[HTML][HTML] Using Supervised Learning to Detect Command and Control Attacks in IoT

M AlShaikh, W Alsemaih, S Alamri… - International Journal of …, 2024 - igi-global.com
The rapid proliferation of internet of things (IoT) devices has ushered in a new era of
technological development. However, this growth has also exposed these devices to various …

Lightweight block cipher for resource constrained iot environment—an survey, performance, cryptanalysis and research challenges

M Abinaya, S Prabakeran - IoT Based Control Networks and Intelligent …, 2022 - Springer
Abstract Nowadays IoT (Internet of Things) is becoming a more popular environment and
has a variety of applications like Smart Home, Smart Healthcare, Vehicles, and many …

Secure location-aided routing protocols with Wi-Fi direct for vehicular ad hoc networks

M Saleh, L Dong - arXiv preprint arXiv:1707.00654, 2017 - arxiv.org
Secure routing protocols are proposed for the vehicular ad hoc networks. The protocols
integrate the security authentication process with the Location-Aided Routing (LAR) protocol …

[PDF][PDF] Vehicular networking road weather information system tailored for arctic winter conditions

T Sukuvaara, K Mäenpää, D Stepanova… - International Journal of …, 2020 - academia.edu
In order to conduct successful long-term service and system architecture development,
permanent infrastructures and development environment are essential. For this purpose …

[图书][B] Sdn And Nfv: A New Dimension To Virtualization

BB Gupta, A Dahiya, E Benkhelifa - 2024 - books.google.com
Software-defined network (SDN) and network function virtualization (NFV) are two
technology trends that have revolutionized network management, particularly in highly …