Reliable and secure data transfer in IoT networks

SP Gochhayat, C Lal, L Sharma, DP Sharma, D Gupta… - Wireless …, 2020 - Springer
With the rapid technological improvements in mobile devices and their inclusion in Internet
of Things (IoT), secure key management becomes mandatory to ensure security of …

An end-to-end secure key management protocol for e-health applications

MR Abdmeziem, D Tandjaoui - Computers & Electrical Engineering, 2015 - Elsevier
Key distribution is required to secure e-health applications in the context of Internet of Things
(IoT). However, resources constraints in IoT make these applications unable to run existing …

Lightweight collaborative key establishment scheme for the Internet of Things

YB Saied, A Olivereau, D Zeghlache, M Laurent - Computer Networks, 2014 - Elsevier
This work addresses new security issues in the Internet of Things (IoT). The heterogeneous
nature of IoT communications and imbalance in resource capabilities between IoT entities …

A robust and efficient vector-based key management scheme for IoT networks

S Bettayeb, ML Messai, SM Hemam - Ad Hoc Networks, 2023 - Elsevier
Abstract Information and communication security is a critical concern in the rapid growth of
Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key …

Secrecy aware key management scheme for Internet of Healthcare Things

C Trivedi, UP Rao - The Journal of Supercomputing, 2023 - Springer
Abstract The Internet of Things (IoT) is becoming an essential aspect of digital healthcare
information; the goal is to monitor various health parameters regularly to make healthcare …

An efficient key management technique for the Internet of Things

T Tabassum, SKA Hossain, MA Rahman, MF Alhamid… - Sensors, 2020 - mdpi.com
The Internet of Things (IoT) has changed our lives drastically. Customers, regulatory bodies,
and industrial partners are driving us to use IoT. Although IoT provides new opportunities …

A secure and robust scheme for sharing confidential information in IoT systems

L Bu, M Isakov, MA Kinsy - Ad Hoc Networks, 2019 - Elsevier
Abstract In Internet of Things (IoT) systems with security demands, there is often a need to
distribute sensitive information (such as encryption keys, digital signatures, or login …

[PDF][PDF] A lightweight authentication and key exchange protocol for IoT

AB Rabiah, KK Ramakrishnan, E Liri… - … on Decentralized IoT …, 2018 - ndss-symposium.org
Security in IoT environments is critical, as there are many situations where IoT devices
provide sensory information that needs to be shared securely. However, providing …

[HTML][HTML] An efficient IoT group association and data sharing mechanism in edge computing paradigm

H Tan - Cyber Security and Applications, 2023 - Elsevier
Despite its benefits and promising future, security and privacy challenges for the IoT wireless
communication of edge computing environment remain unaddressed. As a result, proper …

Device identification and personal data attestation in networks

C Gritti, M Önen, R Molva, W Susilo… - Journal of Wireless Mobile …, 2018 - hal.science
A powerful world connecting digital and physical environments is promised through the
Internet of Things (IoT). However, because of the heterogeneous nature of devices and of …