2020
DOI: 10.1109/tsmc.2019.2903785
|View full text |Cite
|
Sign up to set email alerts
|

Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
43
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 113 publications
(43 citation statements)
references
References 17 publications
0
43
0
Order By: Relevance
“…According to our experience, the problem might be studied in the framework of game theory [45]- [49]. Additionally, it is worthwhile to inspect conventional DDoS defense techniques and frameworks [50]- [53] in the proposed architecture.…”
Section: Resultsmentioning
confidence: 99%
“…According to our experience, the problem might be studied in the framework of game theory [45]- [49]. Additionally, it is worthwhile to inspect conventional DDoS defense techniques and frameworks [50]- [53] in the proposed architecture.…”
Section: Resultsmentioning
confidence: 99%
“…In [8], here they utilize a cryptographic technique to provide encryption to personal data obtained from various medical sources. They embed the data encrypted and convert them into a low complexity image with the help of XOR stenography encoding methodology.…”
Section: Literature Surveymentioning
confidence: 99%
“…As a result, massive access is susceptible to eavesdropping owing to the broadcast nature of wireless channels [8,9]. Traditionally, upper layer cryptography techniques are adopted to guarantee wireless security [10,11]. With the fast development of information techniques, the eavesdropping capability of malicious nodes is increasingly strong, resulting in much more complicated cryptography techniques.…”
Section: Introductionmentioning
confidence: 99%