Open Access
Issue
E3S Web Conf.
Volume 453, 2023
International Conference on Sustainable Development Goals (ICSDG 2023)
Article Number 01048
Number of page(s) 8
DOI https://doi.org/10.1051/e3sconf/202345301048
Published online 30 November 2023
  1. Hossein Motlagh, Naser, Mahsa Mohammadrezaei, Julian Hunt, and Behnam Zakeri. “Internet of Things (IoT) and the energy sector.” Energies 13, no. 2 (2020): 494. [CrossRef] [Google Scholar]
  2. Urbano, Oscar, Angel Perles, Cesar Pedraza, Susana Rubio-Arraez, María Luisa Castelló, María Dolores Ortola, and Ricardo Mercado. “Cost-effective implementation of a temperature traceability system based on smart RFID tags and IoT services.” Sensors 20, no. 4 (2020): 1163. [CrossRef] [PubMed] [Google Scholar]
  3. Khattak, Hasan Ali, Munam Ali Shah, Sangeen Khan, Ihsan Ali, and Muhammad Imran. “Perception layer security in Internet of Things.” Future Generation Computer Systems 100 (2019): 144-164. [CrossRef] [Google Scholar]
  4. Kanj, Matthieu, Vincent Savaux, and Mathieu Le Guen. “A tutorial on NB-IoT physical layer design.” IEEE Communications Surveys & Tutorials 22, no. 4 (2020): 2408-2446. [CrossRef] [Google Scholar]
  5. Özalp, Ahmet Nusret, Zafer Albayrak, Muhammet Çakmak, and Erdal ÖzdoĞan. “Layerbased examination of cyber-attacks in IoT.” In 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1-10. IEEE, 2022. [Google Scholar]
  6. Almaraz-Rivera, Josue Genaro, Jesus Arturo Perez-Diaz, and Jose Antonio Cantoral-Ceballos. “Transport and application layer DDoS attacks detection to IoT devices by using machine learning and deep learning models.” Sensors 22, no. 9 (2022): 3367. [CrossRef] [PubMed] [Google Scholar]
  7. Thakor, Vishal A., Mohammad Abdur Razzaque, and Muhammad RA Khandaker,. “Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities.” IEEE Access 9 (2021): 28177-28193. [CrossRef] [Google Scholar]
  8. S. Roy, U. Rawat, and J. Karjee, “A Lightweight Cellular Automata Based Encryption Technique for IoT Applications, ” IEEE Access, vol. 7, pp. 39782–39793, 2019, doi:10.1109/ACCESS.2019.2906326. [CrossRef] [Google Scholar]
  9. Jassim, Sameeh A., and Alaa K. Farhan. “A survey on stream ciphers for constrained environments.” In 2021 1st Babylon International Conference on Information Technology and Science (BICITS), pp. 228-233. IEEE, 2021. [Google Scholar]
  10. M. A. Khan, M. T. Quasim, N. S. Alghamdi, and M. Y. Khan, “A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data, ” IEEE Access, vol. 8, pp. 52018–52027, 2020, doi:10.1109/ACCESS.2020.2980739. [CrossRef] [Google Scholar]
  11. S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, “Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems, ” J Ambient Intell Humaniz Comput, vol. 12, no. 2, pp. 2033–2051, Feb. 2021, doi:10.1007/s12652-020-02303-5. [CrossRef] [Google Scholar]
  12. M. Cao et al.., “Sec-D2D: A Secure and Lightweight D2D Communication System with Multiple Sensors, ” IEEE Access, vol. 7, pp. 33759–33770, 2019, doi:10.1109/ACCESS.2019.2900727. [CrossRef] [Google Scholar]
  13. Duan, Xintao, Daidou Guo, Nao Liu, Baoxia Li, Mengxiao Gou, and Chuan Qin. “A new highcapacity image steganography method combined with image elliptic curve cryptography and deep neural network.” IEEE Access 8 (2020): 25777-25788. [CrossRef] [Google Scholar]
  14. A. Abro, Z. Deng, and K. A. Memon, “A lightweight elliptic-elgamal-based authentication scheme for secure device-to-device communication, ” Future Internet, vol. 11, no. 5, May 2019, doi:10.3390/fi11050108. [Google Scholar]
  15. C. Meshram, R. W. Ibrahim, L. Deng, S. W. Shende, S. G. Meshram, and S. K. Barve, “A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment, ” Soft Comput, vol. 25, no. 15, pp. 10037–10051, Aug. 2021, doi:10.1007/s00500-021-05929-5. [CrossRef] [Google Scholar]
  16. Chatterjee, Runa, and Rajdeep Chakraborty. “A modified lightweight PRESENT cipher for IoT security.” In 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), pp. 1-6. IEEE, 2020. [Google Scholar]
  17. A. I. Taloba et al.., “A blockchain-based hybrid platform for multimedia data processing in IoTHealthcare, ” Alexandria Engineering Journal, vol. 65, pp. 263–274, Feb. 2023, doi:10.1016/j.aej.2022.09.031. [CrossRef] [Google Scholar]
  18. Sridhar, Godavarthy, Chandupatla Sai Prakash Reddy, Maraka Lalith Siva Sagar Reddy, Kanubuddi Sudheer, Shaik Hiday Tulla, and Md Ataullah. “Edge Computing Based Trustworthy Data Collection by Using Cryptography Technique from IOT.” International Journal of Early Childhood Special Education 14, no. 3 (2022). [Google Scholar]
  19. Saha, Rahul, G. Geetha, Gulshan Kumar, Tai-Hoon Kim, and William J. Buchanan. “MRC4: a modified RC4 algorithm using symmetric random function generator for improved cryptographic features.” IEEE Access 7 (2019): 172045-172054. [CrossRef] [Google Scholar]
  20. Kim, Tai-Hoon, Gulshan Kumar, Rahul Saha, Mamoun Alazab, William J. Buchanan, Mritunjay Kumar Rai, G. Geetha, and Reji Thomas. “CASCF: Certificateless aggregated signcryption framework for internet-of-things infrastructure.” IEEE Access 8 (2020): 94748-94756. [CrossRef] [Google Scholar]
  21. Kaur, Manjit, Ahmad Ali Alzubi, Tarandeep Singh Walia, Vaishali Yadav, Naresh Kumar, Dilbag Singh, and Heung-No Lee. “EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT.” IEEE Access (2023). [Google Scholar]
  22. Kim, Tai-Hoon, Gulshan Kumar, Rahul Saha, William J. Buchanan, Tannishtha Devgun, and Reji Thomas. “LiSP-XK: extended light-weight signcryption for IoT in resource-constrained environments.” IEEE Access 9 (2021): 100972-100980. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.