Internet of Things backdoors: Resource management issues, security challenges, and detection methods

S Hashemi, M Zarei - Transactions on Emerging …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) technology is one of the successful and interesting products
of ubiquitous wireless networks that beneficiate human life with the make use of smart …

Internet of Things: Evolution and technologies from a security perspective

R Ande, B Adebisi, M Hammoudeh, J Saleem - Sustainable Cities and …, 2020 - Elsevier
In recent years, IoT has developed into many areas of life including smart homes, smart
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …

IoT security: A layered approach for attacks & defenses

MM Ahemd, MA Shah, A Wahid - 2017 international conference …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) has been a massive advancement in the Information and
Communication Technology (ICT). It is projected that over 50 billion devices will become …

Challenges and opportunities of mobile cloud computing

M Alizadeh, WH Hassan - 2013 9th International Wireless …, 2013 - ieeexplore.ieee.org
Cloud Computing (CC) is fast becoming well known in the computing world as the latest
technology. CC enables users to use resources as and when they are required. Mobile …

An introduction to image steganography techniques

AAJ Altaay, SB Sahib, M Zamani - … international conference on …, 2012 - ieeexplore.ieee.org
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …

[PDF][PDF] Security challenges facing IoT layers and its protective measures

TA Rao, EU Haq - International Journal of Computer Applications, 2018 - researchgate.net
ABSTRACT The Internet of Things (IoT) is profoundly affecting people's routine lives in
various fields ranging from petite wearable devices to enormous commercial systems and it …

An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems

SS Chaeikar, M Alizadeh, MH Tadayon… - … Journal of Intelligent …, 2022 - Wiley Online Library
For secure communication in a distributed cooperation, generally, the data are encrypted
and decrypted using a symmetric key. The process of creating, distributing, storing …

Security in IoT layers: Emerging challenges with countermeasures

SA Ansar, S Arya, S Aggrawal, S Saxena… - Computer Vision and …, 2023 - Springer
In a short timeframe, Internet of Things (IoT) has gained a lot of traction and has entrenched
itself as a global technology. IoT devices are typically integrated with machine learning and …

[PDF][PDF] An effective lightweight cryptographic algorithm to secure resource-constrained devices

S Rana, S Hossain, HI Shoun… - International Journal of …, 2018 - academia.edu
In recent years, small computing devices like embedded devices, wireless sensors, RFID
tags (Radio Frequency Identification), Internet of Things (IoT) devices are increasing rapidly …

[HTML][HTML] SIKM–a smart cryptographic key management framework

SS Chaeikar, A Ahmadi, S Karamizadeh… - Open Computer …, 2022 - degruyter.com
For a secure data transmission in symmetric cryptography, data are encrypted and
decrypted using an identical key. The process of creating, distributing, storing, deploying …