A blockchain-based intelligent anti-switch package in tracing logistics system

CL Chen, YY Deng, W Weng, M Zhou… - The Journal of …, 2021 - Springer
In recent years, with the rapid development of e-commerce and network technologies, many
people do online shopping through the Internet. If a physical product is bought by a client …

[HTML][HTML] Secure and lightweight privacy preserving Internet of things integration for remote patient monitoring

MI Ahmed, G Kannan - Journal of King Saud University-Computer and …, 2022 - Elsevier
The present article throws light on advancement in ICTs. It is an evident that highly intelligent
and smart IoT based use cases are possible with the advent in ICTs like Internet of Things …

IoT-HarPSecA: a framework and roadmap for secure design and development of devices and applications in the IoT space

MG Samaila, JBF Sequeiros, T Simoes… - IEEE …, 2020 - ieeexplore.ieee.org
The past couple of years have marked continued growth in the applications and services of
the Internet of Things (IoT). This has attracted the attention of new operators as well as …

Performance evaluation of cryptographic algorithms over IoT platforms and operating systems

GCCF Pereira, RCA Alves, FL Silva… - Security and …, 2017 - Wiley Online Library
The deployment of security services over Wireless Sensor Networks (WSN) and IoT devices
brings significant processing and energy consumption overheads. These overheads are …

Lightweight and escrow-less authenticated key agreement for the internet of things

MA Simplicio Jr, MVM Silva, RCA Alves… - Computer …, 2017 - Elsevier
Security is essential for wide wireless sensor network (WSN) deployments, such as the
Internet of Things (IoT). However, the resource-constrained nature of sensors severely …

[图书][B] Modeling and simulation of computer networks and systems: Methodologies and applications

F Zarai, P Nicopolitidis - 2015 - books.google.com
Modeling and Simulation of Computer Networks and Systems: Methodologies and
Applications introduces you to a broad array of modeling and simulation issues related to …

Internet of Things (IoT) based design of a secure and lightweight body area network (BAN) healthcare system

YY Deng, CL Chen, WJ Tsaur, YW Tang, JH Chen - Sensors, 2017 - mdpi.com
As sensor networks and cloud computation technologies have rapidly developed over
recent years, many services and applications integrating these technologies into daily life …

SDA-RDOS: A new secure data aggregation protocol for wireless sensor networks in IoT resistant to DOS attacks

M Dener - Electronics, 2022 - mdpi.com
In a typical Wireless Sensor Network (WSN), thousands of sensor nodes can be distributed
in the environment. Then, each sensor node transmits its detected data to the base station …

CLOC: authenticated encryption for short input

T Iwata, K Minematsu, J Guo, S Morioka - International Workshop on Fast …, 2014 - Springer
We define and analyze the security of a blockcipher mode of operation, CLOC, for provably
secure authenticated encryption with associated data. The design of CLOC aims at …

Survey and comparison of message authentication solutions on wireless sensor networks

MA Simplicio Jr, BT De Oliveira, CB Margi… - Ad Hoc Networks, 2013 - Elsevier
Security is an important concern in any modern network. This also applies to Wireless
Sensor Networks (WSNs), especially those used in applications that monitor sensitive …