Security of internet of things based on cryptographic algorithms: a survey

SK Mousavi, A Ghaffari, S Besharat, H Afshari - Wireless Networks, 2021 - Springer
Abstract Internet of Things (IoT) is a new concept in Information and Communications
Technology and its structure is based on smart objects communications. It contributes to …

Elliptic curve lightweight cryptography: A survey

CA Lara-Nino, A Diaz-Perez… - Ieee …, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …

Analysis of lightweight encryption scheme for fog-to-things communication

AA Diro, N Chilamkurti, Y Nam - IEEE Access, 2018 - ieeexplore.ieee.org
The growing concerns in cybersecurity is preventing unknowns which evolve from time to
time. Internet of Things (IoT) is one of the emerging fields that have been applied for smart …

[HTML][HTML] A multi-tier MQTT architecture with multiple brokers based on fog computing for securing industrial IoT

H Kurdi, V Thayananthan - Applied Sciences, 2022 - mdpi.com
With the rapid growth of internet-connected devices and their resource-constrained
capabilities, the current authentication mechanisms are unable to meet the complex IoT …

Differential flow space allocation scheme in SDN based fog computing for IoT applications

AA Diro, HT Reda, N Chilamkurti - Journal of Ambient Intelligence and …, 2024 - Springer
Technological advancements in wireless communications and electronics have enabled the
rapid evolution of smart things connected to the Internet. Traditional networks face the …

[PDF][PDF] Developed security and privacy algorithms for cyber physical system

DD Khudhur, MS Croock - International Journal of Electrical and …, 2021 - academia.edu
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates
with wireless sensor network (WSN). This system is widely used in many applications such …

Collaborative intrusion detection schemes in fog-to-things computing

A Diro, A Mahmood, N Chilamkurti - Fog/edge computing for security …, 2021 - Springer
The adoption of the Internet of Things (IoT) has raised a significant concern of cyber-attacks
at the edge of the network. As the existing traditional intrusion detection (IDS) solutions …

An effective block-chain based authentication technique for cloud based IoT

SD Babu, R Pamula - Advances in Computing and Data Sciences: 4th …, 2020 - Springer
Nowadays, cloud computing services and applications have created plenty of storage space
to meet the demand and the utility for human life. However, these cloud services face …

Lightweight privacy-preserving equality query in edge computing

Q Wu, F Zhou, J Xu, D Feng, B Li - IEEE Access, 2019 - ieeexplore.ieee.org
As edge computing attains tremendous popularity, IoT devices always outsource their data
to nearby edge servers for storing and pre-processing, which improves the efficiency of data …

Scalable identity and key management for publish-subscribe protocols in the Internet-of-Things

P Anantharaman, K Palani, S Smith - Proceedings of the 9th …, 2019 - dl.acm.org
Publish-Subscribe protocols such as the Message Queuing Telemetry Transport (MQTT)
protocol are considered scalable, lightweight, and one-size-fits-all solutions for the Internet …