[HTML][HTML] Lightweight public key infrastructure for the Internet of Things: A systematic literature review

M El-Hajj, P Beune - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract The Internet of Things (IoT) has transformed everyday environments into
interconnected cyber–physical systems, enabling automation and assistance for diverse …

A survey on security issues in modern implantable devices: Solutions and future issues

E Kwarteng, M Cebe - Smart Health, 2022 - Elsevier
Abstract Implantable Medical Devices (IMD) is a fast pace growing medical field and
continues to grow in the foreseeable future. Advancement in science and technology has led …

Secure and efficient blockchain-assisted authentication for edge-integrated Internet-of-Vehicles

M Shen, H Lu, F Wang, H Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Edge-Integrated Internet-of-Vehicles (IoV) sinks service to edge nodes, which responses
quickly to vehicles' requests and alleviates the burden of cloud servers. In such scenario, the …

An architecture for managing data privacy in healthcare with blockchain

AG de Moraes Rossetto, C Sega, VRQ Leithardt - Sensors, 2022 - mdpi.com
With the fast development of blockchain technology in the latest years, its application in
scenarios that require privacy, such as health area, have become encouraged and widely …

Integration of hardware security modules and permissioned blockchain in industrial iot networks

AJ Cabrera-Gutiérrez, E Castillo… - IEEE …, 2022 - ieeexplore.ieee.org
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers
physical protection while adding a new security layer in the system architecture. When …

BDRA: Blockchain and decentralized identifiers assisted secure registration and authentication for VANETs

X Li, T Jing, R Li, H Li, X Wang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
In vehicular ad hoc networks (VANETs), road safety and road traffic efficiency can be
improved through message interaction between vehicle users, which inevitably relies on …

Hybrid AES-ECC model for the security of data over cloud storage

S Rehman, N Talat Bajwa, MA Shah, AO Aseeri… - Electronics, 2021 - mdpi.com
A cloud computing environment provides a cost-effective way for the end user to store and
access private data over remote storage using some Internet connection. The user has …

[HTML][HTML] Hadoop-based secure storage solution for big data in cloud computing environment

S Guan, C Zhang, Y Wang, W Liu - Digital Communications and Networks, 2024 - Elsevier
In order to address the problems of the single encryption algorithm, such as low encryption
efficiency and unreliable metadata for static data storage of big data platforms in the cloud …

[PDF][PDF] Performance analysis of RSA and elliptic curve cryptography.

D Mahto, DK Yadav - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
This paper presents a performance study and analysis of two popular public-key
cryptosystems: RSA with its two variants, and ECC (Elliptic Curve Cryptography). RSA is …

Lightweight authentication mechanism for industrial IoT environment combining elliptic curve cryptography and trusted token

YS Yang, SH Lee, JM Wang, CS Yang, YM Huang… - Sensors, 2023 - mdpi.com
With the promotion of Industry 4.0, which emphasizes interconnected and intelligent devices,
several factories have introduced numerous terminal Internet of Things (IoT) devices to …