A review of security in internet of things
Abstract Internet of Things (IoT) has drawn significant attention in recent years since it has
made revolutionary changes in human life. The IoT enables the exchange of information in a …
made revolutionary changes in human life. The IoT enables the exchange of information in a …
[HTML][HTML] A roadmap for security challenges in the Internet of Things
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT)
context are playing an active role in human activities, systems and processes. The high …
context are playing an active role in human activities, systems and processes. The high …
Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol
The design of ultralightweight authentication protocols that conform to low-cost tag
requirements is imperative. This paper analyses the most important proposals (except for …
requirements is imperative. This paper analyses the most important proposals (except for …
Ekhonet: High speed ultra low-power backscatter for next generation sensors
This paper argues for a clean-slate redesign of wireless sensor systems to take advantage
of the extremely low power consumption of backscatter communication and emerging ultra …
of the extremely low power consumption of backscatter communication and emerging ultra …
[PDF][PDF] Internet of things: A new application for intelligent traffic monitoring system
L **ao, Z Wang - Journal of networks, 2011 - researchgate.net
Constructing an intelligent traffic monitoring system firstly depends on automatic
identification for vehicles. At present, automatic identification technology based on image …
identification for vehicles. At present, automatic identification technology based on image …
A hardware and secure pseudorandom generator for constrained devices
Hardware security for an Internet of Things or cyber physical system drives the need for
ubiquitous cryptography to different sensing infrastructures in these fields. In particular …
ubiquitous cryptography to different sensing infrastructures in these fields. In particular …
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
In this paper we propose a novel approach to authentication and privacy in mobile RFID
systems based on quadratic residues and in conformance to EPC Class-1 Gen-2 …
systems based on quadratic residues and in conformance to EPC Class-1 Gen-2 …
[LIBRO][B] Security in RFID and sensor networks
P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …
Biomedical image encryption with a novel memristive chua oscillator embedded in a microcontroller
G Jeatsa Kitio, A Djomo Fanda… - Brazilian Journal of …, 2023 - Springer
In this paper, a chaos-based encryption/decryption scheme using a novel memristive Chua
oscillator to protect medical images is presented. The novel Chua oscillator is constructed by …
oscillator to protect medical images is presented. The novel Chua oscillator is constructed by …
A review of cryptographically secure PRNGs in constrained devices for the IoT
A Review of Cryptographically Secure PRNGs in Constrained Devices for the IoT | SpringerLink
Skip to main content Advertisement SpringerLink Account Menu Find a journal Publish with us …
Skip to main content Advertisement SpringerLink Account Menu Find a journal Publish with us …