Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach

H Bostani, M Sheikhan - Computer Communications, 2017 - Elsevier
Abstract Internet of Things (IoT) is a novel paradigm in computer networks in which resource-
constrained objects connect to unreliable Internet by using a wide range of technologies …

Iot: Security challenges and issues of smart homes/cities

R AL MOGBIL, M AL ASQAH… - … on computing and …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most popular technologies that have emerged in
recent years, and its reputation comes from its importance and its real role in changing …

[HTML][HTML] Cryptography in wireless multimedia sensor networks: A survey and research directions

DG Costa, S Figuerêdo, G Oliveira - Cryptography, 2017 - mdpi.com
Wireless multimedia sensor networks will play a central role in the Internet of Things world,
providing content-rich information for an uncountable number of monitoring and control …

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

D Mishra, P Vijayakumar, V Sureshkumar… - Multimedia Tools and …, 2018 - Springer
In current times, multimedia application includes integrated sensors, mobile networks and
Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much …

Improved bio-inspired security scheme for privacy-preserving in the internet of things

Y Harbi, A Refoufi, Z Aliouat, S Harous - Peer-to-Peer Networking and …, 2022 - Springer
Internet of things (IoT) allows the interconnection between physical devices to improve
human lives by offering daily services intelligently. The IoT devices are embedded with …

[HTML][HTML] Survey of QoS routing protocols in wireless multimedia sensor networks

S Aswale, VR Ghorpade - Journal of computer Networks and …, 2015 - hindawi.com
The emergence of Wireless Multimedia Sensor Networks (WMSNs) has stimulated the
refocusing of research from conventional scalar Wireless Sensor Networks (WSNs) to …

A blind spatial domain-based image watermarking using texture analysis and association rules mining

M Ghadi, L Laouamer, L Nana, A Pascu - Multimedia Tools and …, 2019 - Springer
In aims to ensure images authentication, this paper proposes a blind spatial domain-based
image watermarking using texture analysis and association rules mining. The idea is to …

Security analysis of an audio data encryption scheme based on key chaining and DNA encoding

I El Hanouti, H El Fadili - Multimedia Tools and Applications, 2021 - Springer
Fairly recently, a new audio encryption scheme has been proposed. The cryptosystem is
based on a substitution-permutation algorithm using DNA encoding. The key-generation of …

Research on data transmission of wireless sensor networks based on symmetric key algorithm

W Zhou, P Li, QJ Wang, N Nabipour - Measurement, 2020 - Elsevier
In order to improve the security and transmission efficiency of data transmission of wireless
sensor networks, data transmission of wireless sensor networks based on symmetric key …

NFC technology: assessment effective of security towards protecting NFC devices & services

A ALBATTAH, Y ALGHOFAILI… - … on Computing and …, 2020 - ieeexplore.ieee.org
Today with rapid development and adoption of information technology's applications and
services, the way we do business changed significantly and this is making our daily lives …