Key agreement and authentication protocols in the Internet of Things: A survey

S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …

An authentication-based secure data aggregation method in internet of things

M Ataei Nezhad, H Barati, A Barati - Journal of Grid Computing, 2022 - Springer
Abstract Internet of Things (IoT) means connecting different devices through the Internet. The
Internet of things enables humans to remotely manage and control the objects they use with …

Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

S Szymoniak - ACM Computing Surveys, 2024 - dl.acm.org
We use sensor technologies in many areas of everyday life. We use sensors to check and
study various phenomena and to improve our lives. Hence, the sensors are used in …

Artificial intelligence framework‐based ultra‐lightweight communication protocol for prediction of attacks in Internet of Things environment

M Jammula, VM Vakamulla… - Transactions on …, 2023 - Wiley Online Library
Abstract The Internet of Things is an enhanced intelligent infrastructure that is created
through the use of a number of different devices that are capable of self‐organization. Data …

A lightweight distributed detection algorithm for DDAO Attack on RPL routing protocol in Internet of Things

M Sheibani, B Barekatain, E Arvan - Pervasive and Mobile Computing, 2022 - Elsevier
A significant increase in the number of connected devices in the Internet of Things poses a
key challenge to efficiently handling the attacks in routing protocols such as Routing …

Autonomous service for managing real time notification in detection of COVID-19 virus

YM Abd Algani, K Boopalan, G Elangovan… - Computers and …, 2022 - Elsevier
In today's world, the most prominent public issue in the field of medicine is the rapid spread
of viral sickness. The seriousness of the disease lies in its fast spreading nature. The main …

Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices

A Leevik, V Davydov, S Bezzateev - Cryptography, 2023 - mdpi.com
This paper presents a new threshold signature scheme based on Damgaard's work. The
proposed scheme allows for changing the message signature threshold, thereby improving …

DULBC: A dynamic ultra-lightweight block cipher with high-throughput

J Yang, L Li, Y Guo, X Huang - Integration, 2022 - Elsevier
Lightweight block ciphers are important for implementing security services on constrained
devices today. In this paper, we propose a novel ultra-lightweight block cipher DULBC …

Types of lightweight cryptographies in current developments for resource constrained machine type communication devices: Challenges and opportunities

S Ullah, RZ Radzi, TM Yazdani, A Alshehri… - IEEE Access, 2022 - ieeexplore.ieee.org
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …

A DDoS Detection and Prevention System for IoT Devices and Its Application to Smart Home Environment

K Al-Begain, M Khan, B Alothman, C Joumaa… - Applied Sciences, 2022 - mdpi.com
The Internet of Things (IoT) has become an integral part of our daily life as it is growing in
many fields, such as engineering, e-health, smart homes, smart buildings, agriculture …