The rapid uptake of the Wireless Body Area Networks (WBAN) and their services poses unprecedented security requirements. WBAN are evolving to support these requirements …
MT Nuseir, AI Aljumah… - 2022 International Arab …, 2022 - ieeexplore.ieee.org
This study was designed to examine the effect of perceived ease of use, security, integrity, and trustworthiness on the adoption of the Internet of things. The mediating role of trust was …
N Djedjig, D Tandjaoui, F Medjek… - Journal of Information …, 2020 - Elsevier
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification …
Y Alghofaili, MA Rassam - Sensors, 2022 - mdpi.com
Recently, Internet of Things (IoT) technology has emerged in many aspects of life, such as transportation, healthcare, and even education. IoT technology incorporates several tasks to …
In the promising time of the Internet, connected things have the ability to communicate and share information. The Internet of Things (IoT) cannot be implemented unless the security …
Nowadays, the fog computing paradigm is being consolidated as a solution for processing the explosion of data generated by lots of common IoT devices connected to the Internet. In …
W Zhang, H Sun, W Fang, C Zhu, G Jia - IEEE Access, 2023 - ieeexplore.ieee.org
Due to the technical characteristics and application scenarios of distributed networks, their nodes can easily be invaded and compromised. It will result in information being forged or …
Y Alghofaili, MA Rassam - Sensors, 2023 - mdpi.com
The integration of the cloud and Internet of Things (IoT) technology has resulted in a significant rise in futuristic technology that ensures the long-term development of IoT …
The Internet of Things (IoT) is a rapidly evolving field that provides seamless connections to a physical object, making it part of a smart environment. To fully realize the potential power …