IoT-based electric vehicle state estimation and control algorithms under cyber attacks

MM Rana - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
In order to provide intelligent services, the Internet-of-Things (IoT) facilitates millions of smart
devices to be enabled with network connectivity to sense, collect, process, and exchange …

A secure energy-saving communication and encrypted storage model based on RC4 for EHR

J Zhang, H Liu, L Ni - Ieee Access, 2020 - ieeexplore.ieee.org
The commercialization of 5G has greatly promoted the development of medical Internet of
Things (IoT). More medical devices connected to the Internet may further increase the …

A critical review on secure authentication in wireless network

M Diwakar, P Singh, P Kumar, K Tiwari… - … Learning, Advances in …, 2022 - Springer
Wireless network connectivity is capable of addressing various mobility issues and helps
users of smartphones to navigate around and remain connected to the network without …

DTLShps: SDN-based DTLS handshake protocol simplification for IoT

Y Ma, L Yan, X Huang, M Ma… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Datagram transport layer security (DTLS) protocol is widely used in Internet of Things (IoT)
for providing security services. The computational overhead makes it hard to implement …

Network security and Internet of things

S Tayyaba, SA Khan, M Tariq… - Industrial Internet of Things …, 2020 - igi-global.com
Abstract Information security is the most critical component of the information system. It is
also a challenge of the organizations to build a secure network. Every organization that …

Authentication and privacy approach for DHCPv6

A Al-Ani, M Anbar, IH Hasbullah, R Abdullah… - IEEE …, 2019 - ieeexplore.ieee.org
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is used to allocate and distribute
IPv6 addresses and network configuration parameters to DHCPv6 clients. Two well-known …

RSA-based handshake protocol in internet of things

J Mao, H Zhu, YL Liu, YJ Liu, W Qian… - … in medicine and …, 2018 - ieeexplore.ieee.org
Potential security vulnerabilities exist in network layer under the environment of Internet of
Things (IoT). Attacks could jeopardize the commutation between devices if an encryption …

[PDF][PDF] Integrating the Internet of Things to Protect Electric Vehicle Control Systems from Cyber Attacks.

BN Bhukya, V Venkataiah, SM Kuchibhatla… - … International Journal of …, 2024 - iaeng.org
Unexpectedly, wearables, automated teller machines, security alarms, garage doors, home
appliances, and electric cars are just a few examples of the Internet of Things (IoT) that might …

Pattern matching based sensor identification layer for an android platform

H Min, T Kim, J Heo, T Cerny… - Wireless …, 2018 - Wiley Online Library
As sensor‐related technologies have been developed, smartphones obtain more
information from internal and external sensors. This interaction accelerates the development …

Lightweight TLS 1.3 Handshake for C-ITS Systems

D Goncharskyi, SY Kim, P Gu… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Cooperative Intelligent Transport Systems (C-ITS) Deployment Platform is considered the
newest version of vehicular communication systems, which enables the cooperation …