The Advantage of the 5G Network for Enhancing the Internet of Things and the Evolution of the 6G Network

G Gkagkas, DJ Vergados, A Michalas, M Dossis - Sensors, 2024 - mdpi.com
The Internet of Things (IoT) is what we have as a great breakthrough in the 5G network.
Although the 5G network can support several Internet of Everything (IoE) services, 6G is the …

Maximizing IoT Security: An Examination of Cryptographic Algorithms

L Arya, YK Sharma, R Kumar… - … on Power Energy …, 2023 - ieeexplore.ieee.org
The proliferation of Internet of Things (IoT) devices has created a ubiquitous network of
interconnected sensors and devices that generate and exchange vast amounts of data. With …

A Review of IoT Firmware Vulnerabilities and Auditing Techniques

T Bakhshi, B Ghita, I Kuzminykh - Sensors, 2024 - mdpi.com
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a
variety of industrial and consumer areas to facilitate greater automation and increase …

The challenges with Internet of Things security for business

I Kuzminykh, B Ghita, JM Such - International Conference on Next …, 2021 - Springer
Many companies consider IoT as a core element for increasing competitiveness. Despite the
growing number of cyberattacks on IoT devices and the importance of IoT security, no study …

Work-in-Progress: Security of Public-Key Schemes in the Quantum Computing Era–A Literature Review

B Redkins, I Kuzminykh, B Ghita - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Quantum computers, although still in the theoretical stage, conceptually have the power to
break many current cryptosystems, including public-key schemes., for example, RSA (Rivest …

[PDF][PDF] Armstrong Number Encryption Standard for Smart devices-An IoT based Encryption Algorithm

P Sushma, VVH Gopal - 2022 - journal-dogorangsang.in
In the ERA of internet of things, where smart living has took the front seat, Smart devices
enhanced the quality of lifestyle and improved the heterogonous connectivity. These are …

A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks: physical and data-link layer

S Almjamai - 2022 - diva-portal.org
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi)
networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected …

[PDF][PDF] Security of Public-Key Schemes in the Quantum Computing Era–A Literature Review

B Redkins, I Kuzminykh, B Ghita - researchgate.net
Quantum computers, although still in the theoretical stage, conceptually have the power to
break many current cryptosystems, including public-key schemes, for example, RSA (Rivest …