A guideline on pseudorandom number generation (PRNG) in the IoT

P Kietzmann, TC Schmidt, M Wählisch - ACM Computing Surveys …, 2021 - dl.acm.org
Random numbers are an essential input to many functions on the Internet of Things (IoT).
Common use cases of randomness range from low-level packet transmission to advanced …

Cryptographic accelerators for digital signature based on Ed25519

M Bisheh-Niasar, R Azarderakhsh… - … Transactions on Very …, 2021 - ieeexplore.ieee.org
This article presents highly optimized implementations of the Ed25519 digital signature
algorithm [Edwards curve digital signature algorithm (EdDSA)]. This algorithm significantly …

Consensus-based mutual authentication scheme for Industrial IoT

A Haj-Hassan, Y Imine, A Gallais, B Quoitin - Ad Hoc Networks, 2023 - Elsevier
Authentication of new joining nodes in IoT networks is a critical element for maintaining its
security. It ensures the legitimacy of the network to the joining node, and the authorization of …

Internet of Things (IoT) networks: A systematic review and security assessment of authentication schemes

JS Yalli, MH Hasan, LT Jung, SM Al-Selwi - Internet of Things, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are revolutionizing various aspects of our lives by
enabling intelligent and automated systems. However, the proliferation of IoT devices also …

[HTML][HTML] Threat modeling for communication security of IoT-enabled digital logistics

AK Junejo, M Breza, JA McCann - Sensors, 2023 - mdpi.com
The modernization of logistics through the use of Wireless Sensor Network (WSN) Internet of
Things (IoT) devices promises great efficiencies. Sensor devices can provide real-time or …

[HTML][HTML] Design and hardware implementation of a simplified DAG-based blockchain and new AES-CBC algorithm for IoT security

SW Lee, KB Sim - Electronics, 2021 - mdpi.com
Recently, to enhance the security of the Internet of Things (IoT), research on blockchain-
based encryption algorithms has been actively conducted. However, because blockchains …

Content object security in the internet of things: challenges, prospects, and emerging solutions

C Gündoğan, C Amsüss, TC Schmidt… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Content objects are confined data elements that carry meaningful information. Massive
amounts of content objects are published and exchanged every day on the Internet. The …

Performance analysis of secure elements for IoT

M Noseda, L Zimmerli, T Schläpfer, A Rüst - IoT, 2022 - mdpi.com
New protocol stacks provide wireless IPv6 connectivity down to low power embedded IoT
devices. From a security point of view, this leads to high exposure of such IoT devices …

[HTML][HTML] Design, analysis, and experimental evaluation of a new secure rejoin mechanism for lorawan using elliptic-curve cryptography

S Milani, I Chatzigiannakis - Journal of Sensor and Actuator Networks, 2021 - mdpi.com
LoRaWAN (Long Range Wide Area Network) is a Low-Power Wide Area Networks (LPWAN)
technology with very rapid uptake during the previous years, developed by the LoRa (Long …

On TLS for the Internet of Things, in a Post Quantum world

M Scott - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract The TLS (Transport Layer Security) protocol is the most important, most attacked,
most analysed and most used cryptographic protocol in the world today. TLS is critical to the …