2020
DOI: 10.1177/1550147720916384
|View full text |Cite
|
Sign up to set email alerts
|

An efficient emerging network and secured hopping scheme employed over the unsecured public channels

Abstract: With the emergence of new smart technologies, including the Internet of Things, wireless media are playing an important role to connect numerous devices to fulfill the requirements of newly developed communication systems. The massive connectivity, therefore, made the wireless spectrum too crowded and gave several challenges to resisting against potential wireless jammers. Note that, the two main challenges that have always been a part of any communication system, especially in the case of wireless communicati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Therefore, collecting information from IoT objects is sensitive and important to keep secure, not to be leaked maliciously; ensuring the confidentiality of information is important for IoT. In literature [3,6,43,51], numerous solutions, especially cryptography algorithms as strong security solutions, are used to enhance various security challenges of IoT; cryptography encryption operations are significant to protect IoT sensitive information from adversaries. However, for IoT, a network composes a massive number of objects, it is difficult to protect the confidentiality of information from millions of objects, even with edge/fog connectivity, employing cryptography encryption algorithms [51,59].…”
Section: Confidentialitymentioning
confidence: 99%
See 3 more Smart Citations
“…Therefore, collecting information from IoT objects is sensitive and important to keep secure, not to be leaked maliciously; ensuring the confidentiality of information is important for IoT. In literature [3,6,43,51], numerous solutions, especially cryptography algorithms as strong security solutions, are used to enhance various security challenges of IoT; cryptography encryption operations are significant to protect IoT sensitive information from adversaries. However, for IoT, a network composes a massive number of objects, it is difficult to protect the confidentiality of information from millions of objects, even with edge/fog connectivity, employing cryptography encryption algorithms [51,59].…”
Section: Confidentialitymentioning
confidence: 99%
“…For IoT-based warehouse inventory management and the supply chain system [ 41 , 42 ], the issues of privacy and security can be solved by employing cryptography and information hiding mechanisms [ 5 , 6 , 22 , 23 , 24 , 25 ]. For IoT, cryptography solutions [ 40 , 43 ], such as symmetric and asymmetric solutions, are the best solutions to provide and gain security or confidentiality in unsecured transmission. Both solutions used complex encryption and decryption operations, having different key pairs and sizes, to secure transmission against vulnerabilities and attacks [ 5 , 40 ].…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations