A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

[HTML][HTML] A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

MAP based modeling method and performance study of a task offloading scheme with time-correlated traffic and VM repair in MEC systems

Y Wang, X Han, S Jin - Wireless Networks, 2023 - Springer
Abstract Mobile Edge Computing (MEC) has evolved into a key technology that can
leverage resources of computing, storage and network deployed at the proximity of the …

Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm

H Asgharzadeh, A Ghaffari, M Masdari… - Journal of Parallel and …, 2023 - Elsevier
Nowadays, the growth and pervasiveness of Internet of Things (IoT) devices have led to
increased attacks by hackers and attackers. On the other hand, using IoT infrastructure in …

Cryptography algorithms for enhancing IoT security

F Thabit, O Can, AO Aljahdali, GH Al-Gaphari… - Internet of Things, 2023 - Elsevier
In today's fast-paced world, a new technology paradigm known as the Internet of Things
(IoT) is advancing every business. It provides communication between the digital and …

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing

S Cherbal, A Zier, S Hebal, L Louail… - The Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …

Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach

AE Adeniyi, KM Abiodun, JB Awotunde… - Multimedia Tools and …, 2023 - Springer
The need of keeping medical information safe and secure stems from the fact that doctors
rely on it to make accurate diagnoses. If this information is altered in any way, no matter how …

[HTML][HTML] Modified artificial bee colony based feature optimized federated learning for heart disease diagnosis in healthcare

MM Yaqoob, M Nazir, A Yousafzai, MA Khan… - Applied Sciences, 2022 - mdpi.com
Heart disease is one of the lethal diseases causing millions of fatalities every year. The
Internet of Medical Things (IoMT) based healthcare effectively enables a reduction in death …

Maximizing IoT Security: An Examination of Cryptographic Algorithms

L Arya, YK Sharma, R Kumar… - … on Power Energy …, 2023 - ieeexplore.ieee.org
The proliferation of Internet of Things (IoT) devices has created a ubiquitous network of
interconnected sensors and devices that generate and exchange vast amounts of data. With …

A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …