A review of security in internet of things

Y Harbi, Z Aliouat, S Harous, A Bentaleb… - Wireless Personal …, 2019 - Springer
Abstract Internet of Things (IoT) has drawn significant attention in recent years since it has
made revolutionary changes in human life. The IoT enables the exchange of information in a …

[HTML][HTML] A roadmap for security challenges in the Internet of Things

AR Sfar, E Natalizio, Y Challal, Z Chtourou - Digital Communications and …, 2018 - Elsevier
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT)
context are playing an active role in human activities, systems and processes. The high …

Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol

P Peris-Lopez, JC Hernandez-Castro… - … Workshop, WISA 2008 …, 2009 - Springer
The design of ultralightweight authentication protocols that conform to low-cost tag
requirements is imperative. This paper analyses the most important proposals (except for …

Ekhonet: High speed ultra low-power backscatter for next generation sensors

P Zhang, P Hu, V Pasikanti, D Ganesan - Proceedings of the 20th annual …, 2014 - dl.acm.org
This paper argues for a clean-slate redesign of wireless sensor systems to take advantage
of the extremely low power consumption of backscatter communication and emerging ultra …

[PDF][PDF] Internet of things: A new application for intelligent traffic monitoring system

L Xiao, Z Wang - Journal of networks, 2011 - researchgate.net
Constructing an intelligent traffic monitoring system firstly depends on automatic
identification for vehicles. At present, automatic identification technology based on image …

A hardware and secure pseudorandom generator for constrained devices

M Bakiri, C Guyeux, JF Couchot… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Hardware security for an Internet of Things or cyber physical system drives the need for
ubiquitous cryptography to different sensing infrastructures in these fields. In particular …

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems

R Doss, S Sundaresan, W Zhou - Ad Hoc Networks, 2013 - Elsevier
In this paper we propose a novel approach to authentication and privacy in mobile RFID
systems based on quadratic residues and in conformance to EPC Class-1 Gen-2 …

[图书][B] Security in RFID and sensor networks

P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …

[HTML][HTML] Biomedical image encryption with a novel memristive chua oscillator embedded in a microcontroller

G Jeatsa Kitio, A Djomo Fanda… - Brazilian Journal of …, 2023 - Springer
In this paper, a chaos-based encryption/decryption scheme using a novel memristive Chua
oscillator to protect medical images is presented. The novel Chua oscillator is constructed by …

A review of cryptographically secure PRNGs in constrained devices for the IoT

AB Orúe, L Hernández Encinas, V Fernández… - … Joint Conference SOCO …, 2018 - Springer
A Review of Cryptographically Secure PRNGs in Constrained Devices for the IoT | SpringerLink
Skip to main content Advertisement SpringerLink Account Menu Find a journal Publish with us …