Vulnerabilities and limitations of MQTT protocol used between IoT devices

D Dinculeană, X Cheng - Applied Sciences, 2019 - mdpi.com
With the proliferation of smart devices capable of communicating over a network using
different protocols, each year more and more successful attacks are recorded against these …

Continuous patient monitoring with a patient centric agent: A block architecture

MA Uddin, A Stranieri, I Gondal… - IEEE Access, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) has facilitated services without human intervention for a wide
range of applications, including continuous remote patient monitoring (RPM). However, the …

Dual watermarking framework for privacy protection and content authentication of multimedia

NN Hurrah, SA Parah, NA Loan, JA Sheikh… - Future generation …, 2019 - Elsevier
In the current multimedia networked infrastructure, privacy breaches due to cyber-attacks
result in huge economic losses. Despite these threats there is ever increasing demand to …

PRISMA Archetype‐Based Systematic Literature Review of Security Algorithms in the Cloud

J Kwao Dawson, F Twum… - Security and …, 2023 - Wiley Online Library
Industries have embraced cloud computing for their daily operations due to the volume of
data they create. As data generation and consumption have increased, the challenges and …

[HTML][HTML] A substitution box for lightweight ciphers to secure internet of things

V Panchami, MM Mathews - Journal of King Saud University-Computer and …, 2023 - Elsevier
Abstract The Internet of Things is a resource-constrained device that demands lightweight
cryptographic solutions to achieve high performance and optimal security. In lightweight …

BoSMoS: A blockchain-based status monitoring system for defending against unauthorized software updating in industrial Internet of Things

S He, W Ren, T Zhu, KKR Choo - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The role of the Industrial Internet of Things (IIoT) in critical infrastructure sectors, such as
power, chemistry, and manufacturing, will be increasingly important as we move toward …

A lightweight continuous authentication protocol for the Internet of Things

YH Chuang, NW Lo, CY Yang, SW Tang - Sensors, 2018 - mdpi.com
Modern societies are moving toward an information-oriented environment. To gather and
utilize information around people's modern life, tiny devices with all kinds of sensing devices …

Security and performance in IoT: A balancing act

LE Kane, JJ Chen, R Thomas, V Liu, M Mckague - IEEE access, 2020 - ieeexplore.ieee.org
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by
2022, performance of these low powered devices, as well as security is of utmost …

An enhanced key schedule algorithm of PRESENT-128 block cipher for random and non-random secret keys

M Imdad, SN Ramli, H Mahdin - Symmetry, 2022 - mdpi.com
The key schedule algorithm (KSA) is a crucial element of symmetric block ciphers with a
direct security impact. Despite its undeniable significance, the KSA is still a less focused …

Trust aggregation authentication protocol using machine learning for IoT wireless sensor networks

S Chinnaswamy, K Annapurani - Computers & Electrical Engineering, 2021 - Elsevier
Security is a huge concern in the Internet of Things (IoT)-based Wireless Sensor Networks
(WSNs). Authentication becomes critical in a highly secured environment and reliable …