Current research trends in IoT security: a systematic map** study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

Data encryption for internet of things applications based on catalan objects and two combinatorial structures

MH Saračević, SZ Adamović… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
This article presents a novel data encryption technique suitable for Internet of Things (IoT)
applications. The cryptosystem is based on the application of a Catalan object (as a …

[PDF][PDF] Encryption with User Authentication Model for Internet of Medical Things Environment.

KS Riya, R Surendran… - … Automation & Soft …, 2023 - researchgate.net
Internet of Medical Things (IoMT) enabled e-healthcare has the potential to greately improve
conventional healthcare services significantly. However, security and privacy become major …

Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices

N Yasmin, R Gupta - International Journal of Information Technology, 2024 - Springer
The internet of things (IoT) ensures flexible network services to the end devices connected to
it. Although security has always been a concern for such networks. There are several …

Cryptography algorithms for improving the security of cloud‐based internet of things

MA Qasem, F Thabit, O Can, E Naji… - Security and …, 2024 - Wiley Online Library
In today's fast‐paced society, the Internet of Things (IoT) is revolutionizing businesses by
bridging the gap between the digital and physical realms. This transformative technology …

A Survey on Cybersecurity in IoT.

E Dritsas, M Trigka - Future Internet, 2025 - search.ebscohost.com
The proliferation of the Internet of Things (IoT) has transformed the digital landscape,
enabling a vast array of interconnected devices to communicate and share data seamlessly …

Internet of Things Authentication Protocols: Comparative Study.

S Dargaoui, M Azrour, A El Allaoui… - Computers …, 2024 - search.ebscohost.com
Nowadays, devices are connected across all areas, from intelligent buildings and smart
cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things …

Assessment of potential security risks in advanced metering infrastructure using the OCTAVE Allegro approach

AI Awad, M Shokry, AAM Khalaf… - Computers and Electrical …, 2023 - Elsevier
One of the crucial components of a smart grid is the advanced metering infrastructure (AMI),
which integrates information and communication technologies with a conventional electricity …

[HTML][HTML] AIBPSF-IoMT: artificial intelligence and blockchain-based predictive security framework for IoMT technologies

BM Alshammari - Electronics, 2023 - mdpi.com
The latest advancements in artificial intelligence (AI) technologies, including machine and
deep learning models, in prediction, recommending, and automating processes have greatly …

Energy‐Aware Intrusion Detection Model for Internet of Vehicles Using Machine Learning Methods

L Lihua - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
With increasing development of Internet of Things (IoT) technology, wireless
communications, big data, and smart applications, vehicular communications have become …