A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities …
The Internet of Things (IoT) has experienced constant growth in the number of devices
deployed and the range of applications in which such devices are used. They vary widely in …
deployed and the range of applications in which such devices are used. They vary widely in …
A novel MQTT security framework in generic IoT model
Abstract Internet of Things (IoT) emerges as a revolutionary technology since the last double
decade. Internet of things has changed many aspects of the human. IoT has changed …
decade. Internet of things has changed many aspects of the human. IoT has changed …
LDA-2IoT: A level dependent authentication using two factor for IoT paradigm
The widespread expansion of IoT-based services is transforming people's living habits. With
the vast data generation and intelligent decision making system, IoT supports many …
the vast data generation and intelligent decision making system, IoT supports many …
Cryptanalysis of ecc-based key agreement scheme for generic IoT network model
Enhancement in Wireless sensing technology had widened its application scope and
deployment possibilities. Since 2004, Wireless Sensor Network (WSN) became one of the …
deployment possibilities. Since 2004, Wireless Sensor Network (WSN) became one of the …
Customer Empowered Privacy-Preserving Secure Verification using Decentralized Identifier and Verifiable Credentials For Product Delivery Using Robots
C Patel - arxiv preprint arxiv:2208.06165, 2022 - arxiv.org
In the age of respiratory illnesses like COVID 19, we understand the necessity for a robot
based delivery system to ensure safe and contact free courier delivery. A blockchain based …
based delivery system to ensure safe and contact free courier delivery. A blockchain based …
An overview of the edge computing in the modern digital age
The explosive growth of the Internet of Things (IoT) devices and the growing computing
power of these devices has resulted in unprecedented volumes of data. Which will continue …
power of these devices has resulted in unprecedented volumes of data. Which will continue …
LDA-IoT: a level dependent authentication for IoT paradigm
The IoT-based services are getting a widespread expansion in all the directions and
dimensions of this century. In most IoT-based applications, the sensor collects the data and …
dimensions of this century. In most IoT-based applications, the sensor collects the data and …
Internet of Things: A Review on Major Challenges and Applications
Internet of Things has created high opportunities for industries to enhance their
manufacturing, servicing and supplying capabilities. Industrial Internet of Things (IIoT) will …
manufacturing, servicing and supplying capabilities. Industrial Internet of Things (IIoT) will …
[PDF][PDF] Cryptanalysis and improvement of Barman et al.'s secure remote user authentication scheme
In past people used to send the messages in plain text over the public channel. However,
this protocol susceptible to various attacks like anyone can read the message, no proper …
this protocol susceptible to various attacks like anyone can read the message, no proper …
Smart home security
A Goel, C Patel - … Green Communication Network for Internet of …, 2023 - taylorfrancis.com
The Internet of Things (IoT) is a technology which has taken a big role in our daily lives. For
smart homes, IoT offers several benefits over traditional communication technologies; yet …
smart homes, IoT offers several benefits over traditional communication technologies; yet …