New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value

A Abusukhon, S AlZu'bi - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
Data encryption techniques are important for answering the question: How secure is the
Internet for sending sensitive data. Keeping data secure while they are sent through the …

Device-specific security challenges and solution in IoT edge computing: a review

A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023 - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …

Ranking security of IoT-based smart home consumer devices

NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …

On the security of the standardized MQV protocol and its based Evolution Protocols

Z Mohammad, V Nyangaresi… - 2021 International …, 2021 - ieeexplore.ieee.org
The MQV is an authenticated key agreement protocol which does not use any one-way hash
functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its …

Blockchain-based authentication and explainable ai for securing consumer iot applications

R Kumar, D Javeed, A Aljuhani, A Jolfaei… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The consumer Internet of Things (IoT) applications in particular smart cities are mostly
equipped with Internet-connected networked devices to improve city operations by giving …

IoT Sentinel: Correlation-based Attack Detection, Localization, and Authentication in IoT Networks

D Yang, A Kumar, S Ray, W Wang… - 2023 32nd International …, 2023 - ieeexplore.ieee.org
Security issues have become one of the major challenges for Internet-of-Things (IoT)
networks. To overcome this challenge, the recent commonly-used approaches mainly focus …

[HTML][HTML] Strength of Deep Learning-based Solutions to Secure Healthcare IoT: A Critical Review

AT Mathew, P Mani - The Open …, 2023 - openbiomedicalengineeringjournal …
Healthcare applications of IoT systems have gained huge popularity across the globe. From
personal monitoring to expert clinical diagnosis, healthcare IoT systems have shown their …

Pubic cloud computing: Big three vendors

A Alkhatib, A Al Sabbagh… - … Conference on Information …, 2021 - ieeexplore.ieee.org
There has been a significant increase in the adoption of cloud computing, and Azure, AWS
and Google Cloud are striving to become the best cloud providers. Various extraordinary …

Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther

Z Mohammad - International Journal of Communication …, 2020 - Wiley Online Library
Hao proposed the YAK as a robust key agreement based on public‐key authentication, and
the author claimed that the YAK protocol withstands all known attacks and therefore is …

[HTML][HTML] Secure medical sensor monitoring framework using novel optimal encryption algorithm driven by Internet of Things

J Lekha, K Sandhya, U Archana, C Anilkumar… - Measurement …, 2023 - Elsevier
Recently, healthcare monitoring systems have emerged as significant tolls for constant
monitoring of patient's physiological characteristics. These systems use implanted sensors …