Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges

S Pundir, M Wazid, DP Singh, AK Das… - IEEE …, 2019 - ieeexplore.ieee.org
As we all know that the technology is projected to be next to humans very soon because of
its holistic growth. Now-a-days, we see a lot of applications that are making our lives …

Provably secure ECC-based device access control and key agreement protocol for IoT environment

AK Das, M Wazid, AR Yannam, JJPC Rodrigues… - IEEE …, 2019 - ieeexplore.ieee.org
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …

A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs

I Ali, M Gervais, E Ahene, F Li - Journal of Systems Architecture, 2019 - Elsevier
Abstract Vehicular Ad Hoc Networks (VANETs) have been developing based on the state-of-
art in wireless network communication technologies to improve traffic on roads. However …

Certificate-based anonymous device access control scheme for IoT environment

S Malani, J Srinivas, AK Das… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
As the “Internet communications infrastructure” develops to encircle smart devices, it is very
much essential for designing suitable methods for secure communications with these smart …

LDAKM-EIoT: Lightweight device authentication and key management mechanism for edge-based IoT deployment

M Wazid, AK Das, S Shetty, J JPC Rodrigues, Y Park - Sensors, 2019 - mdpi.com
In recent years, edge computing has emerged as a new concept in the computing paradigm
that empowers several future technologies, such as 5G, vehicle-to-vehicle communications …

Bio-inspired cryptosystem with DNA cryptography and neural networks

S Basu, M Karuppiah, M Nasipuri, AK Halder… - Journal of Systems …, 2019 - Elsevier
Abstract Bio-Inspired Cryptosystems are a modern form of Cryptography where bio-inspired
and machine learning techniques are used for the purpose of securing data. A system has …

Cloud storage auditing with deduplication supporting different security levels according to data popularity

H Hou, J Yu, R Hao - Journal of Network and Computer Applications, 2019 - Elsevier
The public cloud storage auditing with deduplication is proposed to check the integrity of
cloud data under the condition that the cloud stores only a single copy of the same file from …

CPDA: A confidentiality-preserving deduplication cloud storage with public cloud auditing

J Wu, Y Li, T Wang, Y Ding - IEEE Access, 2019 - ieeexplore.ieee.org
With growing popularity of cloud storage, the number of users of outsourcing data to cloud
servers has increased dramatically. On the one hand, the rapidly increasing volume of data …

[PDF][PDF] IoT security evolution: challenges and countermeasures review

AMA Abuagoub - International Journal of Communication Networks …, 2019 - academia.edu
Internet of Things (IoT) architecture, technologies, applications and security problems have
been recently addressed by a number of researchers. Basically, IoT adds internet …

[PDF][PDF] Security and privacy preserving of sensor data localization based on internet of things

SR Mugunthan - Journal of ISMAC, 2019 - scholar.archive.org
The internet of thing which is a prominent network for the transmission of valuable
information over the internet, by tracking, computing and refining handles large scale of …