Privacy-preservation techniques for IoT devices: a systematic map** study

D Torre, A Chennamaneni, A Rodriguez - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …

A privacy-preserving federated learning with a secure collaborative for malware detection models using Internet of Things resources

A Alamer - Internet of Things, 2024 - Elsevier
The rise in malware attacks presents a growing security threat in today's digital landscape,
emphasizing the need for advanced malware detection methodology. While numerous …

A context-aware information-based clone node attack detection scheme in Internet of Things

K Hameed, S Garg, MB Amin, B Kang… - Journal of Network and …, 2022 - Elsevier
The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract
interest across a range of applications, including smart homes, smart transportation, smart …

A privacy-preserving scheme to support the detection of multiple similar request-real-time services in IoT application systems

AMA Alamer, SAM Basudan, PCK Hung - Expert Systems with Applications, 2023 - Elsevier
Abstract Many Internet of Things (IoT) network and security studies have suggested to
design a secure transmission scheme based on cryptographic methodology to guarantee …

Intelligent privacy preservation proctol in wireless MANET for IoT applications using hybrid crow search-harris hawks optimization

S Pamarthi, R Narmadha - Wireless Networks, 2022 - Springer
Abstract Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for
complex scenarios, including law, military enforcement as well disaster recovery, and …

An authenticated group shared key mechanism based on a combiner for hash functions over the industrial internet of things

W Ali, AA Ahmed - Processes, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) provides internet connectivity for instruments, digital
machines, and any other manufactured object to enable intelligent industrial operations to …

A privacy protection scheme for electricity transactions in the microgrid day-ahead market based on consortium blockchain

B Wang, H Liu, S Zhang - International Journal of Electrical Power & Energy …, 2022 - Elsevier
The electricity trading plan made by the users in the microgrid day-ahead market (DAM)
contains the electricity consumption information of the future day. Aiming at the problem that …

High-speed batch verification for discrete-logarithm-based signatures via Multi-Scalar Multiplication Algorithm

M Li, C Peng, L Han, Q Feng, M Luo - Journal of Information Security and …, 2024 - Elsevier
Digital signatures are widely used in a variety of applications necessitating authentication.
However, the amount of data is steadily increasing in domains like IoT, blockchain, e …

[HTML][HTML] Unforgeable Digital Signature Integrated into Lightweight Encryption Based on Effective ECDH for Cybersecurity Mechanism in Internet of Things

AA Ahmed, OM Barukab - Processes, 2022 - mdpi.com
Cybersecurity protocols enable several levels of protection against cyberattacks (digital
attacks) that spread across network devices, platform programs, and network applications …

On-demand anonymous access and roaming authentication protocols for 6G satellite–ground integrated networks

Y Tao, H Du, J Xu, L Su, B Cui - Sensors, 2023 - mdpi.com
Satellite–ground integrated networks (SGIN) are in line with 6th generation wireless network
technology (6G) requirements. However, security and privacy issues are challenging with …