Survey on IoT: security threats and applications

I Ahmad, MS Niazy, RA Ziar, S Khan - Journal of Robotics and …, 2021 - journal.umy.ac.id
Abstract the rapid growth of the internet of things (IoT) in the world in recent years is due to
its wide range of usability, adaptability, and smartness. Most of the IoT applications are …

A mechanism for securing IoT-enabled applications at the fog layer

N Abbas, M Asim, N Tariq, T Baker… - Journal of Sensor and …, 2019 - mdpi.com
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous
technologies composed of smart ubiquitous objects that are seamlessly connected to the …

Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication

Z Ashraf, A Sohail, M Yousaf - The Journal of Supercomputing, 2023 - Springer
Over the last decade, millions of 4G and 5G-enabled mobile devices have become part of
the Internet. Almost, all the applications have been shifted to smartphones. A person …

Towards a multi-party, blockchain-based identity verification solution to implement clear name laws for online media platforms

K Pinter, D Schmelz, R Lamber, S Strobl… - … : Blockchain and Central …, 2019 - Springer
Online communication has increased steadily over the past decades. It has become
common practice that the identities of content creators do not have to be revealed. The use …

A Comprehensive Survey of Security Challenges and Threats in Internet of Things

R Kumar, S Kumar, P Arjariya - 2021 5th International …, 2021 - ieeexplore.ieee.org
The Internet of Things is part of our everyday life, which applies to all aspects of human life;
from smart phones and environmental sensors to smart devices used in the industry. The …

RETRACTED: A hybrid security strategy (HS2) for reliable video streaming in fog computing

SA Hussein, AI Saleh, HED Mostafa, MI Obaya - 2020 - Elsevier
The article is a duplicate of a paper that has already been published in Wireless Netw 26,
1389–1416 (2020), https://doi. org/10.1007/s11276-019-02203-3. One of the conditions of …

[PDF][PDF] Common Knowledge Based Secure Generation and Exchange of Symmetric Keys

H Chen, J Wu, W Guo, F Hang, Z Luo… - International Journal of …, 2023 - ijns.jalaxy.com.tw
Man-in-the-middle attacks bring severe security threats to the Diffie-Hellman (DH) based
symmetric key generation and exchange. This paper proposed a common knowledge-based …

[PDF][PDF] Shaimaa A. Hussein, Ahmed I. Saleh, Hossam El-Din Mostafa & Marwa

I Obaya - researchgate.net
Recently, digital communication and storage over the Internet through the cloud have
increased in a rapid manner. Accordingly, data security becomes a vital issue as there are …