The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

A computation offloading method over big data for IoT-enabled cloud-edge computing

X Xu, Q Liu, Y Luo, K Peng, X Zhang, S Meng… - Future Generation …, 2019 - Elsevier
The Internet of mobile things is a burgeoning technique that generates, stores and
processes big real-time data to render rich services for mobile users. In order to mitigate …

The rise of ransomware and emerging security challenges in the Internet of Things

I Yaqoob, E Ahmed, MH ur Rehman, AIA Ahmed… - Computer Networks, 2017 - Elsevier
With the increasing miniaturization of smartphones, computers, and sensors in the Internet of
Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have …

Federated internet of things and cloud computing pervasive patient health monitoring system

JH Abawajy, MM Hassan - IEEE Communications Magazine, 2017 - ieeexplore.ieee.org
The exponentially growing healthcare costs coupled with the increasing interest of patients
in receiving care in the comfort of their own homes have prompted a serious need to …

Enhancing the performance of healthcare service in IoT and cloud using optimized techniques

P Kumar, K Silambarasan - IETE Journal of Research, 2022 - Taylor & Francis
Big data research for health service applications, from the approval of the cloud computing
and the Internet of Things (IoT) model of healthcare brought drastic changes in the medical …

Vulnerability and impact analysis of the IEC 61850 GOOSE protocol in the smart grid

HT Reda, B Ray, P Peidaee, A Anwar, A Mahmood… - Sensors, 2021 - mdpi.com
IEC 61850 is one of the most prominent communication standards adopted by the smart grid
community due to its high scalability, multi-vendor interoperability, and support for several …

IoT enabled RFID authentication and secure object tracking system for smart logistics

S Anandhi, R Anitha, V Sureshkumar - Wireless Personal Communications, 2019 - Springer
Object tracking is a fundamental problem in Supply Chain Management (SCM). Recent
innovations eliminate the difficulties in traditional approach such as manual counting …

Physical-layer detection and security of printed chipless RFID tag for Internet of Things applications

G Khadka, B Ray, NC Karmakar… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article has proposed detection and physical-layer security provision for printed sensory
tag systems for Internet of Things (IoT) applications. The printed sensory tags can be a very …

An improved IoT/RFID-enabled object tracking and authentication scheme for smart logistics

BA Alzahrani, A Irshad - Wireless Personal Communications, 2023 - Springer
Smart logistics play a crucial role for rapid industrialization and economic development of
the countries. It not only assists in delivering the low cost services to the subscribers but also …

A novel framework for a remote patient monitoring (RPM) system with abnormality detection

CR Su, J Hajiyev, CJ Fu, KC Kao, CH Chang… - Health Policy and …, 2019 - Elsevier
Objective This research aims to build an effective and automated RPM system based on an
information communication technology (ICT) framework that automatically triggers medical …