Over recent years, we have witnessed the rapid growth of Internet-connected devices, ranging from very simple sensors to highly complex cloud servers shaping the Internet of …
A Zaky, E Elmitwalli, M Hemeda… - 2019 15th …, 2019 - ieeexplore.ieee.org
The fact that security is not the main functionality of an IoT device means that even lesser portion of its computing power is available for security. Security measures implemented in …
KU Bhat, N Kumar, N Koul, C Verma… - … in Computing: ICRIC …, 2023 - books.google.com
Abstract To enable Machine-to-Machine (M2M) communication and data transmission using fundamental network protocols like TCP/IP, the Internet of Things (IoT) provides a sturdy …
In today's world, data transmission and storage are becoming increasingly dependent on information security, and many processes frequently employ images. Therefore, it is …
The research aims to establish a modified version of the PRESENT lightweight cipher to consume less power in the AVR 8-bit microcontroller Atmel 128 with respect to code size …
Abstract To enable Machine-to-Machine (M2M) communication and data transmission using fundamental network protocols like TCP/IP, the Internet of Things (IoT) provides a sturdy …
Cyber Physical Systems (CPS) is essential for the integration of the physical world with the virtual electronic world. The only way to provide security to these constrained environment …