A survey of IoT security based on a layered architecture of sensing and data analysis

H Mrabet, S Belguith, A Alhomoud, A Jemai - Sensors, 2020 - mdpi.com
The Internet of Things (IoT) is leading today's digital transformation. Relying on a
combination of technologies, protocols, and devices such as wireless sensors and newly …

Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home

Z Rahman, X Yi, M Billah, M Sumi, A Anwar - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) has brought new ways for humans and machines to
communicate with each other over the internet. Though sensor-driven devices have largely …

Обзор методов встраивания информации в цифровые объекты для обеспечения безопасности в «интернете вещей»

ОО Евсютин, АС Кокурина - Компьютерная оптика, 2019 - cyberleninka.ru
Передача, обработка и хранение информации в инфраструктуре «интернета вещей»
сопряжены с необходимостью решения ряда задач обеспечения информационной …

[HTML][HTML] Data transmission using secure hybrid techniques for smart energy metering devices

G Ramyasri, GR Murthy, S Itapu, SM Krishna - e-Prime-Advances in …, 2023 - Elsevier
Data transfer between components, continuous device monitoring, and other features are
possible with an IoT-based energy management system. Due to its lightweight, compact …

A review of methods of embedding information in digital objects for security in the internet of things

OO Evsyutin, AS Kokurina, RV Mescheriakov - Computer optics, 2019 - mathnet.ru
OO Evsyutin, AS Kokurina, RV Mescheriakov, “A review of methods of embedding
information in digital objects for security in the internet of things”, Computer Optics, 43:1 (2019) …

Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems

O Evsutin, A Melman, AA Abd El-Latif - … and Privacy Preserving for IoT and …, 2022 - Springer
Cyber-physical systems are one of the key technological trends in the modern world.
However, their use is associated with the need to counter a variety of cyber threats. This …

Exploring the usability, security, and privacy of smart locks from the perspective of the end user

H Hazazi, M Shehab - Nineteenth Symposium on Usable Privacy and …, 2023 - usenix.org
Smart home devices have recently become a sought-after commodity among homeowners
worldwide. Among these, smart locks have experienced a marked surge in market share …

A distributed XACML based access control architecture for IoT systems

LA Charaf, I ALIHAMIDI, A ADDAIM… - … Research in Applied …, 2020 - ieeexplore.ieee.org
IoT (Internet of Things) is the new technological revolution that enables the high connectivity
of intelligent objects or devices both to each other or/and to humans. However, the major …

Understanding and Improving the Usability, Security, and Privacy of Smart Locks from the Perspective of the End User

H Hazazi - 2024 - search.proquest.com
Over the past two decades, the Internet of Things (IoT) has seen a significant expansion in
both the sophistication and variety of its applications. These applications span several …

IOT, Deep Learning and Cybersecurity in Smart Homes: A Survey

M Atieh, O Mohammad, A Sabra, N Rmayti - 2022 - ieeexplore.ieee.org
Cybersecurity experts have noticed an increasing trend towards machine learning‐based
solutions and most of them revolve around machine learning and deep learning techniques …