Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2024 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges

M Waqas, S Tu, Z Halim, SU Rehman, G Abbas… - Artificial Intelligence …, 2022 - Springer
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …

RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones

M Tanveer, N Kumar, MM Hassan - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones
deployed for collecting sensitive data to be used in critical applications. The drones transmit …

LAKE-IoD: Lightweight authenticated key exchange protocol for the Internet of Drone environment

M Tanveer, AH Zahid, M Ahmad, A Baz… - IEEE Access, 2020 - ieeexplore.ieee.org
A drone is an unmanned aerial vehicle, which is deployed in a particular Fly Zone (FZ), and
used to collect crucial information from its surrounding environment to be transmitted to the …

A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing

S Tu, M Waqas, F Huang, G Abbas, ZH Abbas - Computer Networks, 2021 - Elsevier
Fog computing is a revolutionary technology for the next generation to bridge the gap
between cloud data centers and end-users. Fog computing is not a counterfeit for cloud …

Cybersecurity in automotive: An intrusion detection system in connected vehicles

F Pascale, EA Adinolfi, S Coppola, E Santonicola - Electronics, 2021 - mdpi.com
Today's modern vehicles are connected to a network and are considered smart objects of
IoT, thanks to the capability to send and receive data from the network. One of the greatest …

Efficient dynamic S-box generation using linear trigonometric transformation for security applications

AH Zahid, M Ahmad, A Alkhayyat, MT Hassan… - IEEE …, 2021 - ieeexplore.ieee.org
Protection of data transmitted over the network from illegal access is one of the major
challenges being posed by exponential growth of data in online digital communication …

LAKE-6SH: Lightweight user authenticated key exchange for 6LoWPAN-based smart homes

M Tanveer, G Abbas, ZH Abbas, M Bilal… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Ensuring security and privacy in the Internet of Things (IoT) while taking into account the
resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT …

IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity

M Safkhani, S Rostampour, Y Bendavid, N Bagheri - Computer Networks, 2020 - Elsevier
Nowadays the sharing of trade in counterfeit and pirated goods is constantly growing and
fake products are found in a large number of industries–particularly pharmaceuticals, food …

Cyberattacks and security of cloud computing: a complete guideline

M Dawood, S Tu, C **ao, H Alasmary, M Waqas… - Symmetry, 2023 - mdpi.com
Cloud computing is an innovative technique that offers shared resources for stock cache and
server management. Cloud computing saves time and monitoring costs for any organization …