IoT elements, layered architectures and security issues: A comprehensive survey

M Burhan, RA Rehman, B Khan, BS Kim - sensors, 2018 - mdpi.com
The use of the Internet is growing in this day and age, so another area has developed to use
the Internet, called Internet of Things (IoT). It facilitates the machines and objects to …

[HTML][HTML] Authentication and identity management of IoHT devices: achievements, challenges, and future directions

M Mamdouh, AI Awad, AAM Khalaf, HFA Hamed - Computers & Security, 2021 - Elsevier
Abstract The Internet of Things (IoT) paradigm serves as an enabler technology in several
domains. Healthcare is one of the domains in which the IoT plays a vital role in increasing …

Cyber and physical security vulnerability assessment for IoT-based smart homes

B Ali, AI Awad - sensors, 2018 - mdpi.com
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices,
objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated …

Security threats and measures in the Internet of Things for smart city infrastructure: A state of art

R Sharma, R Arya - Transactions on Emerging …, 2023 - Wiley Online Library
Abstract The Internet of Things (IoT) is a network of physical objects or “things” implanted
with electronics, software, sensors, and connectivity to allow them to exchange data with …

Threats and corrective measures for IoT security with observance of cybercrime: A survey

S Rani, A Kataria, V Sharma, S Ghosh… - Wireless …, 2021 - Wiley Online Library
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality
and comfort. IoT has contributed significantly to numerous application areas. The stormy …

A novel scheme for designing secure substitution boxes (S-boxes) based on Mobius group and finite field

B Arshad, N Siddiqui, Z Hussain… - Wireless Personal …, 2022 - Springer
Data encryption with substitution-box (S-box) is now widely regarded as the most secure
method of communicating in order to prevent unauthorized access to sensitive and …

A distributed security mechanism for resource-constrained IoT devices

J King, AI Awad - Informatica, 2016 - informatica.si
Abstract Internet of Things (IoT) devices have grown up to comprise embedded systems and
sensors with the ability to connect, collect, and transmit data over the Internet. Although …

[PDF][PDF] Designing Pair of Nonlinear Components of a Block Cipher over Gaussian Integers.

M Sajjad, T Shah, RJ Serna - Computers, Materials & Continua, 2023 - researchgate.net
In block ciphers, the nonlinear components, also known as substitution boxes (S-boxes), are
used with the purpose of inducing confusion in cryptosystems. For the last decade, most of …

A hybrid secured approach combining LSB steganography and AES using mosaic images for ensuring data security

S Roy, MM Islam - SN Computer Science, 2022 - Springer
Steganography is a technique of hiding information in digital media such as images, text,
audio, etc. This digital media is used as the cover to make the private message invisible …

[HTML][HTML] Throughput optimized reversible cellular automata based security algorithm

SK Nanda, S Mohanty, PK Pattnaik, M Sain - Electronics, 2022 - mdpi.com
Reversible cellular automation is a highly parallel system and produces enhanced
throughput in its cryptographic applications. The throughput optimized security algorithm …