Securing the internet of things in the age of machine learning and software-defined networking

F Restuccia, S D'oro, T Melodia - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) realizes a vision where billions of interconnected devices are
deployed just about everywhere, from inside our bodies to the most remote areas of the …

An overview of potential authentication threats and attacks on Internet of Things (IoT): A focus on Smart home applications

AM Gamundani, A Phillips… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Internet of things (IoT) are finding their wide use in various domains. IoT implementation in
the Smart home domain is one that is complex as the devices that are being used in such …

[PDF][PDF] A survey: Privacy and security to Internet of Things with Cloud Computing

S Jaiswal, MB Chandra - International Journal of Control Theory …, 2017 - researchgate.net
Internet of Things (IoT) is an extremely dynamic and new research field of computer science
and information technology domain. An IOT is multi domain research field which focused …

Golay code based bit mismatch mitigation for wireless channel impulse response based secrecy generation

C Shen, H Li, G Sahin, HA Choi, Y Shah - IEEE Access, 2018 - ieeexplore.ieee.org
The wireless radio communications channel between two legitimate user terminals has long
been considered as a renewable source of shared secrecy. As characterization of the …

High entropy secrecy generation from wireless CIR

H Li, C Shen, Y Zhao, G Sahin… - Journal of …, 2019 - ieeexplore.ieee.org
The physical characteristics of wireless channels, in particular the channel impulse
response (CIR), have become an attractive source of shared secrecy between two …

Symmetric key generation from imperfect shared phy-layer secrecy

C Shen, S Feng, G Sahin… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
Physical-Layer (PHY) based secrecy has inherent advantages for generating symmetric
keys in communication security, due to the reciprocity of the wireless communications …

A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home …

AM Gamundani, A Phillips, HN Muyingi - … 8-10, 2018, Proceedings, Part II, 2018 - Springer
Abstract Internet of Things (IoT) authentication for resource-constrained devices thrives
under lightweight solutions. The requirements of the lightweight solutions are that, they have …