Innovative resource-saving security strategies for IoT devices
The astounding trend of increasing the number of connected IoT devices reflects the growing importance of this technology in industry, healthcare, the domestic sphere, and other sectors. However, with the expansion of IoT capabilities, the number of challenges also rises, particularly regarding the...
Saved in:
| Main Authors: | Inna Rozlomii, Andrii Yarmilko, Serhii Naumenko |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Academy of Cognitive and Natural Sciences
2025-05-01
|
| Series: | Journal of Edge Computing |
| Subjects: | |
| Online Access: | https://acnsci.org/journal/index.php/jec/article/view/748 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Verifiably Secure and Lightweight Device-to-Device (D2D) Authentication Protocol for the Resource-Constrained IoT Networks
by: Naif Alzahrani
Published: (2025-01-01) -
Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation
by: Saja Kareem Ismael, et al.
Published: (2025-03-01) -
Procedures for Building a Secure Environment in IoT Networks Using the LoRa Interface
by: Sebastian Łeska, et al.
Published: (2025-06-01) -
Accurate Indoor Localization with IoT Devices and Advanced Fingerprinting Methods
by: Farshad Khodamoradi, et al.
Published: (2024-12-01) -
Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications
by: Salem AlJanah, et al.
Published: (2025-05-01)