2022
DOI: 10.1063/5.0081958
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of hybrid one time password generation algorithm for IoT data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…Blockchain technology is used by many financial services, such as digital assets, remittance, and online payment systems. Furthermore, BC has the potential to be used in other domains, including IoT, public services, and security services [8]. Once transactions are recorded on the ledger, they are immutable due to the unalterable nature of the blockchain.…”
Section: Blockchainmentioning
confidence: 99%
“…Blockchain technology is used by many financial services, such as digital assets, remittance, and online payment systems. Furthermore, BC has the potential to be used in other domains, including IoT, public services, and security services [8]. Once transactions are recorded on the ledger, they are immutable due to the unalterable nature of the blockchain.…”
Section: Blockchainmentioning
confidence: 99%
“…Security is considered one of the major challenging tasks since IWSN is utilized in numerous real-time applications including smart industry, surveillance, building monitoring, burglar alarms, etc. [8][9][10] To safeguard the data that is transferred between sensor nodes of the network or between sensors and base stations, confidentiality is necessary for IWSN; otherwise, the communication may be eavesdropped on. Each sensor node and the sink must be able to confirm that the data received was delivered by a trustworthy sender in IWSN and wasn't a ruse by an adversary to get legitimate nodes to accept fake data.…”
Section: Introductionmentioning
confidence: 99%
“…Security is considered one of the major challenging tasks since IWSN is utilized in numerous real‐time applications including smart industry, surveillance, building monitoring, burglar alarms, etc 8–10 . To safeguard the data that is transferred between sensor nodes of the network or between sensors and base stations, confidentiality is necessary for IWSN; otherwise, the communication may be eavesdropped on.…”
Section: Introductionmentioning
confidence: 99%
“…In spite of significant advances in the domain of individual activity analysis, the challenge of modeling and perceptive crowd behaviors remains undeveloped. Therefore, an effective remote monitoring system is necessitated for detecting the anomaly behavior of malicious nodes in the WSN environment 14–16 …”
Section: Introductionmentioning
confidence: 99%
“…Therefore, an effective remote monitoring system is necessitated for detecting the anomaly behavior of malicious nodes in the WSN environment. [14][15][16] In this work, a new AI-based remote monitoring system has been proposed to identify the anomaly behavior of malicious nodes in the network. The proposed work eliminates unnecessary denoising preprocess and strengthens the robustness of the detection model.…”
mentioning
confidence: 99%