Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …
The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …
RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones
Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones
deployed for collecting sensitive data to be used in critical applications. The drones transmit …
deployed for collecting sensitive data to be used in critical applications. The drones transmit …
LAKE-IoD: Lightweight authenticated key exchange protocol for the Internet of Drone environment
A drone is an unmanned aerial vehicle, which is deployed in a particular Fly Zone (FZ), and
used to collect crucial information from its surrounding environment to be transmitted to the …
used to collect crucial information from its surrounding environment to be transmitted to the …
A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing
Fog computing is a revolutionary technology for the next generation to bridge the gap
between cloud data centers and end-users. Fog computing is not a counterfeit for cloud …
between cloud data centers and end-users. Fog computing is not a counterfeit for cloud …
Cybersecurity in automotive: An intrusion detection system in connected vehicles
Today's modern vehicles are connected to a network and are considered smart objects of
IoT, thanks to the capability to send and receive data from the network. One of the greatest …
IoT, thanks to the capability to send and receive data from the network. One of the greatest …
Efficient dynamic S-box generation using linear trigonometric transformation for security applications
Protection of data transmitted over the network from illegal access is one of the major
challenges being posed by exponential growth of data in online digital communication …
challenges being posed by exponential growth of data in online digital communication …
LAKE-6SH: Lightweight user authenticated key exchange for 6LoWPAN-based smart homes
Ensuring security and privacy in the Internet of Things (IoT) while taking into account the
resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT …
resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT …
IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity
Nowadays the sharing of trade in counterfeit and pirated goods is constantly growing and
fake products are found in a large number of industries–particularly pharmaceuticals, food …
fake products are found in a large number of industries–particularly pharmaceuticals, food …
Cyberattacks and security of cloud computing: a complete guideline
Cloud computing is an innovative technique that offers shared resources for stock cache and
server management. Cloud computing saves time and monitoring costs for any organization …
server management. Cloud computing saves time and monitoring costs for any organization …