[HTML][HTML] Smart grids and renewable energy systems: Perspectives and grid integration challenges

M Khalid - Energy Strategy Reviews, 2024 - Elsevier
The concept of smart grid (SG) was made real to give the power grid the functions and
features it needs to make a smooth transition towards renewable energy integration and …

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2023 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing

S Cherbal, A Zier, S Hebal, L Louail… - The Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …

Modeling-attack-resistant strong PUF exploiting stagewise obfuscated interconnections with improved reliability

C Xu, L Zhang, MK Law, X Zhao, PI Mak… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
This article presents an obfuscated-interconnection physical unclonable function (OIPUF) to
resist modeling attacks. By introducing nonlinear operations through exploiting the random …

A survey on hardware security: Current trends and challenges

S Akter, K Khalil, M Bayoumi - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security has become a critical concern due to the globalization of the Integrated
Circuit (IC) supply chain and the complex network connections of computing-intensive …

LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment

M Abdussami, R Amin, S Vollala - International Journal of Information …, 2022 - Springer
Due to the massive increase in the Internet of Things (IoT) devices in various applications
requiring an IoT–cloud environment, the network latency is high since all the IoT devices …

PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs

X Liu, Y Wang, Y Li, H Cao - Computer Networks, 2023 - Elsevier
In vehicular ad-hoc networks (VANETs), road traffic efficiency and road safety can be
improved through message interaction and sharing between vehicle users, which inevitably …

MC-DSC: A dynamic secure resource configuration scheme based on medical consortium blockchain

W Liang, S Xie, KC Li, X Li, X Kui… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Blockchain technology, with its unique decentralized and tamper-resistant features, is being
utilized to address the issue of information silos in traditional electronic healthcare …

A comprehensive survey on hardware-assisted malware analysis and primitive techniques

EP Kumar, S Priyanka - Computer Networks, 2023 - Elsevier
Malware poses an extremely dangerous threat to the digital world, significantly impacting
various domains such as smart cities, intelligent transportation, wireless sensor networks …

High-rate secret key generation using physical layer security and physical unclonable functions

T Assaf, A Al-Dweik, Y Iraqi, S Jangsher… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Physical layer security (PLS) can be adopted for efficient key generation and sharing in
secured wireless systems. The inherent random nature of the wireless channel and the …