Article
Computer Science, Information Systems
Ata Ullah, Muhammad Azeem, Humaira Ashraf, N. Z. Jhanjhi, Lewis Nkenyereye, Mamoona Humayun
Summary: Internet of Things (IoT) has gained increasing interest due to its wide applicability in various fields. This article presents a critical data reclamation (CDR) protocol that provides secure data transmission for isolated clusters in IoT-enabled wireless sensor networks (WSNs). Extensive simulations show that the CDR protocol outperforms other counterparts in terms of communication cost, energy consumption, and resilience.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Theory & Methods
Sarbjeet Singh, Dilip Kumar
Summary: The Internet of Medical Things (IoMT) ecosystem is vast and complex, with numerous healthcare devices gathering and transmitting medical data. IoMT faces challenges related to energy efficiency, security, and privacy due to heterogeneous data. This paper proposes a secure data fusion-based data aggregation scheme that optimizes energy usage and improves data quality.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Computer Science, Information Systems
Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen
Summary: The proliferation of Internet of Things (IoT) in healthcare has raised concerns about data security and privacy while attempts to provide secure and efficient IoT schemes still lack in achieving secure data analysis. Dynamic data about patient medical status is valuable for healthcare providers, but continually updating data over time poses challenges. The study focuses on developing an efficient and secure scheme for data collection and analysis using IoT wireless body sensors.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Mathematics, Interdisciplinary Applications
Gulzar Mehmood, Muhammad Sohail Khan, Abdul Waheed, Mahdi Zareei, Muhammad Fayaz, Tariq Sadad, Nazri Kama, Azri Azmi
Summary: Wireless Sensor Networks face challenges of energy consumption and security, and the development of robust security is crucial. Cryptography techniques are favorable for security in WSN, but energy efficiency is key due to resource limitations. A secure hybrid session key management scheme has been proposed to minimize energy consumption and ensure optimal security by reducing public key cryptography steps.
Article
Computer Science, Information Systems
Manaf Bin-Yahya, Xuemin Shen
Summary: This article proposes a new energy-aware network topology obfuscation mechanism that maximizes the attack costs and is efficient and practical to be deployed. The proposed mechanism includes a route obfuscation method based on ranking-based route mutation and a sink node obfuscation method based on the k-anonymity model. Extensive simulation results demonstrate that the proposed methods can effectively mitigate traffic analysis attacks and achieve effective network topology obfuscation for software-defined wireless sensor networks.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Artificial Intelligence
Haqi Khalid, Shaiful Jahari Hashim, Sharifah Mumtazah Syed Ahmad, Fazirulhisyam Hashim, Muhammad Akmal Chaudhary
Summary: An online/offline lightweight authentication scheme using AES-RSA algorithm is proposed to enhance the security and efficiency of VANET in IIoT, with offline joining added to avoid risks. The study employs BAN logic to prove mutual authentication and AVISPA tool to formally evaluate and verify system security. Results show the proposed scheme outperforms other schemes in computation and communication cost efficiency.
PEERJ COMPUTER SCIENCE
(2021)
Article
Computer Science, Information Systems
Gagandeep Kaur, Prasenjit Chanak, Mahua Bhattacharya
Summary: This article proposes an intelligent routing scheme based on deep reinforcement learning (DRL) for IoT-enabled Wireless Sensor Networks (WSNs), aiming to increase network lifetime and reduce communication delay. Experimental results demonstrate that the proposed scheme is more efficient compared to state-of-the-art algorithms in terms of the number of alive nodes, packet delivery, energy efficiency, and communication delay in the network.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Medicine, General & Internal
Heon Jeong, Sang-Woong Lee, Mazhar Hussain Malik, Efat Yousefpoor, Mohammad Sadegh Yousefpoor, Omed Hassan Ahmed, Mehdi Hosseinzadeh, Amir Mosavi
Summary: This article introduces a secure routing scheme called SecAODV for wireless body sensor networks, which includes three phases: bootstrapping, routing, and communication security. Simulation results demonstrate that SecAODV improves performance in various metrics.
FRONTIERS IN MEDICINE
(2022)
Article
Computer Science, Information Systems
Yumei Li, Futai Zhang, Xin Liu
Summary: This article proposes an efficient identity-based linearly homomorphic network coding signature scheme for wireless sensor networks to ensure data integrity and authenticity. The scheme has high computational efficiency and is resistant to various attacks.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Richa Sarma, Ferdous Ahmed Barbhuiya
Summary: This paper discusses the accelerated growth of the Internet of Things (IoT) and the introduction of the fog computing paradigm to enable data processing near end-users. However, the current cloud-fog-IoT framework poses a significant threat to data security. The paper proposes a CP-ABE scheme that addresses the issues of attribute merging, attribute revocation, outsourcing operations, and privileged access. Security and performance analyses show that the proposed scheme is secure and suitable for IoT devices.
COMPUTERS & ELECTRICAL ENGINEERING
(2022)
Article
Computer Science, Information Systems
Abdul Razaque, Fathi Amsaad, Musbah Abdulgader, Bandar Alotaibi, Fawaz Alsolami, Duisen Gulsezim, Saraju P. Mohanty, Salim Hariri
Summary: CPS has seen rapid development in intelligent and connected cities, however, the issue of efficient mobility remains unresolved. In this study, we propose a privacy-aware secure human-centric mobility-aware (SHM) model and validate it through testing. The model strikes a balance between energy efficiency and QoS requirements and is compared to other models. The testing results demonstrate the compelling features of the secure CPS provided by the SHM model.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Rekha Goyat, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Rahul Saha, Reji Thomas
Summary: The energy conservative extension of IoT, green IoT, is a revolutionary approach that connects people, processes, and things in an energy-efficient way. However, the existing research in green IoT does not allow decentralized management of data due to its disadvantages. This article introduces a blockchain-based privacy-preserving framework for green IoT called BENIGREEN, which addresses the problems of decentralization, energy conservation, and privacy. BENIGREEN uses weight metrics for energy-efficient cluster heads selection and integrates a decentralized blockchain framework with an authentication scheme for secure transmission.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Sami Bettayeb, Mohamed-Lamine Messai, Sofiane Mounine Hemam
Summary: This paper presents a new key management scheme based on pre-distributed vectors to address security problems in IoT networks. The scheme divides the network into subareas, making it lightweight, scalable, and resilient to attacks. The proposed scheme is more efficient in terms of storage, communications, computation overheads, and energy consumption, and is more resilient against node capture attacks, making it suitable for resource-limited IoT networks.
Article
Mathematics
Tsu-Yang Wu, Qian Meng, Yeh-Cheng Chen, Saru Kumari, Chien-Ming Chen
Summary: The extensive application of IoT and AI technology has greatly promoted the construction and development of smart cities. However, the privacy and data security of smart home users accessing the system through public channels are vulnerable to attack. This paper presents a provably secure authentication scheme for the smart home environment, ensuring only legitimate users can use smart devices. The scheme is verified using an informal model and formally analyzed using the Real or Random model. By comparing security and performance analysis, our scheme proves to have higher security with similar performance.
Article
Computer Science, Information Systems
Cong Peng, Min Luo, Pandi Vijayakumar, Debiao He, Omar Said, Amr Tolba
Summary: This study proposes a multifunctional and multidimensional secure data aggregation scheme to address security issues and functional requirements in wireless sensor networks. The scheme encodes multidimensional data into large integers using the Chinese remainder theorem conversion method and supports data analysis with various aggregation functions. Experimental results show that the scheme has lower computation and communication costs compared to existing schemes in high-dimensional scenarios.
IEEE INTERNET OF THINGS JOURNAL
(2022)