The internet of things: a survey

S Li, LD Xu, S Zhao - Information systems frontiers, 2015 - Springer
In recent year, the Internet of Things (IoT) has drawn significant research attention. IoT is
considered as a part of the Internet of the future and will comprise billions of intelligent …

[HTML][HTML] Security and privacy issues of physical objects in the IoT: Challenges and opportunities

X Yao, F Farha, R Li, I Psychoula, L Chen… - Digital Communications …, 2021 - Elsevier
Abstract In the Internet of Things (IoT), security and privacy issues of physical objects are
crucial to the related applications. In order to clarify the complicated security and privacy …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

The Internet of Things: a security point of view

S Li, T Tryfonas, H Li - Internet Research, 2016 - emerald.com
Purpose–The purpose of this paper is to provide an in-depth overview of the security
requirements and challenges for Internet of Things (IoT) and discuss security solutions for …

Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags

A Tewari, BB Gupta - The Journal of Supercomputing, 2017 - Springer
Abstract Internet of Things (IoT) is an evolving architecture which connects multiple devices
to Internet for communication or receiving updates from a cloud or a server. In future, the …

SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity

HY Chien - IEEE transactions on dependable and secure …, 2007 - ieeexplore.ieee.org
As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight
RFID authentication protocols to resist all possible attacks and threats. However, all of the …

SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT

SF Aghili, H Mala, P Kaliyar, M Conti - Future Generation Computer …, 2019 - Elsevier
The safety of medical data and equipment plays a vital role in today's world of Medical
Internet of Things (MIoT). These IoT devices have many constraints (eg, memory size …

A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol

YP Liao, CM Hsiao - Ad hoc networks, 2014 - Elsevier
Abstract IoT (Internet of Things) is a type of network where ICT (Information and
Communication Technology) links any physical objects to the internet to perform information …

On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags

KH Wang, CM Chen, W Fang, TY Wu - The Journal of Supercomputing, 2018 - Springer
Abstract Recently, Tewari and Gupta proposed a ultra-lightweight mutual authentication
protocol in IoT environments for RFID tags. Their protocol aims to provide secure …

A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective

HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …