Lightweight cryptography: a solution to secure IoT

SS Dhanda, B Singh, P Jindal - Wireless Personal Communications, 2020 - Springer
Abstract In Internet of Things (IoT), the massive connectivity of devices and enormous data
on the air have made information susceptible to different type of attacks. Cryptographic …

A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …

Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions

AA Alfa, JK Alhassan, OM Olaniyi, M Olalere - Journal of Reliable …, 2021 - Springer
The growth of Internet of Things (IoT) took center stage universally due their capability to
advance the course of human lives. Consequent upon this, several challenges were thrown …

TBM: A trust-based monitoring security scheme to improve the service authentication in the Internet of Things communications

F Alqahtani, Z Al-Makhadmeh, A Tolba… - Computer Communications, 2020 - Elsevier
Securing communications and information sharing within the Internet of Things (IoT)
paradigm is challenging because of the increase in the size and mobility of the user …

Compressive sensing based secure data aggregation scheme for IoT based WSN applications

A Salim, A Ismail, W Osamy, A M. Khedr - PloS one, 2021 - journals.plos.org
Compressive Sensing (CS) based data collection schemes are found to be effective in
enhancing the data collection performance and lifetime of IoT based WSNs. However, they …

Grey Wolf based compressive sensing scheme for data gathering in IoT based heterogeneous WSNs

A Aziz, W Osamy, AM Khedr, AA El-Sawy, K Singh - Wireless Networks, 2020 - Springer
Sensor node energy constraint is considered as an impediment in the further development
of the Internet of Things (IoT) technology. One of the most efficient solution is to combine …

Lightweight block cipher for resource constrained iot environment—an survey, performance, cryptanalysis and research challenges

M Abinaya, S Prabakeran - IoT Based Control Networks and Intelligent …, 2022 - Springer
Abstract Nowadays IoT (Internet of Things) is becoming a more popular environment and
has a variety of applications like Smart Home, Smart Healthcare, Vehicles, and many …

L-RTAM: Logarithm based reliable trust assessment model for WBSNs

A Kumar, K Singh, T Khan - Journal of Discrete Mathematical …, 2021 - Taylor & Francis
In has been considered that the sensor network's safety measures have been built upon a
non-realistic, trusted environment. After analyzing the trust models for wireless body sensor …

An efficient secure data transmission and node authentication scheme for wireless sensing networks

L Li, S Li, H Peng, J Bi - Journal of Systems Architecture, 2022 - Elsevier
With the development of big data era, wireless sensor networks (WSNs) are widely used.
However, the wireless sensing network has the disadvantages that it is difficult to monitor …

RTM: realistic weight-based reliable trust model for large scale WSNs

T Khan, K Singh - Wireless Personal Communications, 2023 - Springer
Trust estimation approaches in wireless sensor networks (WSNs) are mainly used to
improve security, reliability, system efficiency, lifespan, decision-making, and collaboration …