[HTML][HTML] A framework for application-centric Internet of Things authentication

N Shingari, B Mago - Results in Engineering, 2024 - Elsevier
Abstract The Internet of Things (IoT) has various security needs due to its diversified data
management and application support. IoT processing platforms provide security guidelines …

False event message detection robust to burst attacks in wireless sensor networks

Y Sei, A Ohsuga - IEEE Open Journal of the Communications …, 2022 - ieeexplore.ieee.org
A sensor device can be used to detect target events at low cost. Moreover, there is a
significant risk of sensor nodes being compromised or captured within large wireless sensor …

A proposal for dynamic and secure authentication in IoT architectures based on SDN

Y Abbassi, H Toumi… - … and the Digital Economy, 2022 - search.informit.org
The connectivity of private resources on public infrastructure, user mobility, and the advent of
new technologies have added new client and server-side security requirements. Security is …

Effective Mutual Authentication Scheme and Message Authentication for Internet of Things (IoT) using Fog Computing Technology

SR Homadi, OA Dawood - 2023 16th International Conference …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a rapidly growing technology that is increasingly used in
Intelligent Communication Systems (ICS). However, its high speed, heterogeneous devices …

[PDF][PDF] Survey of Authentication Framework for the Physical Objects in WSN of IoT

CR Mankar, VM Patil, GP Gawali - 2023 - academia.edu
In IoT proliferation of the WSN is rapid, to ensure the security of the physical objects many
challenges are faced. This paper is a comprehensive survey of frameworks for …

A lightweight algorithm for the detection of fake incident reports in wireless communication systems

Sensor devices in 6G technology are an affordable method for identifying target incidents
within large wireless communication systems (WCSs). However, they face potential …