Survey of security and privacy issues of internet of things

T Borgohain, U Kumar, S Sanyal - arXiv preprint arXiv:1501.02211, 2015 - arxiv.org
This paper is a general survey of all the security issues existing in the Internet of Things (IoT)
along with an analysis of the privacy issues that an end-user may face as a consequence of …

Cryptanalysis of password authentication schemes: Current status and key issues

SK Sood, AK Sarje, K Singh - 2009 Proceeding of International …, 2009 - ieeexplore.ieee.org
Password is the most commonly used technique for user authentication due to its simplicity
and convenience. The main advantage of passwords is that users can memorize them easily …

Influence of awareness and training on cyber security

KF McCrohan, K Engel, JW Harvey - Journal of internet Commerce, 2010 - Taylor & Francis
This article presents the results of a study to determine the impact of a cyber threat education
and awareness intervention on changes in user security behavior. Subjects were randomly …

AUTHHOTP - HOTP Based Authentication Scheme over Home Network Environment

HJ Kim, HS Kim - … Conference on Computational Science and Its …, 2011 - Springer
With the rapid growth of Internet users and wireless applications, interests on home
networks have been enormously increased in recent years. For digital home networks …

PriPresent: an embedded prime LightWeight block cipher for smart devices

M Girija, P Manickam, M Ramaswami - Peer-to-Peer Networking and …, 2021 - Springer
Lightweight cryptography (LWC) is a compact and advancing cryptography protocol. Internet
of Things (IoT) is a cutting edge technology which is developed for resource constrained …

RETRACTED ARTICLE: A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks

S Vimala, V Khanaa, C Nalini - Cluster Computing, 2019 - Springer
The security inside the network correspondence is a noteworthy concern. Being the way that
information is considered as the profitable asset of an association, giving security against …

A flow-based detection method for stealthy dictionary attacks against Secure Shell

A Satoh, Y Nakamura, T Ikenaga - Journal of Information Security and …, 2015 - Elsevier
SANS has warned about the new variants of SSH dictionary attacks that are very stealthy in
comparison with a simple attack. In this paper, we propose a new method to detect simple …

[PDF][PDF] User authentication using neural network in smart home networks

SZ Reyhani, M Mahdavi - International Journal of Smart Home, 2007 - gvpress.com
Security has been an important issue in the smart home applications. In home networks with
distributed architectures that consist of a broad range of wired or wireless devices, it is likely …

SSH dictionary attack detection based on flow analysis

A Satoh, Y Nakamura, T Ikenaga - 2012 IEEE/IPSJ 12th …, 2012 - ieeexplore.ieee.org
SSH services are run on many hosts with various scopes other than just operation, so
dictionary attack against the service is a common security threat. SANS has reported the …

Application of multi factor authentication in internet of things domain

U Gupta - arXiv preprint arXiv:1506.03753, 2015 - arxiv.org
Authentication forms the gateway to any secure system. Together with integrity,
confidentiality and authorization it helps in preventing any sort of intrusions into the system …