Topic Review
Social Behavioral Biometrics
Social Behavioral Biometrics (SBB) is a novel biometric category. This innovative field of study investigates a person’s social interactions and communication patterns to ascertain their identity. 
  • 234
  • 12 Oct 2023
Topic Review
Security of the Internet of Things
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate their efforts on system security. Any vulnerability could lead to a system failure or cyberattack, which would have a large-scale impact. With billions of interconnected devices, ensuring robust security measures is crucial to safeguard sensitive data, protect user privacy, and mitigate potential cyber threats. Failure to prioritize IoT security could have far-reaching consequences, jeopardizing individuals, organizations, and even critical infrastructure. IoT security is a protection strategy and defense mechanism that protects against the possibility of cyberattacks that specifically target physically linked IoT devices. IoT security teams are currently dealing with growing difficulties, such as inventories, operations, diversity, ownership, data volume, threats, etc.
  • 331
  • 16 May 2023
Topic Review
Security Analysis of Embedded Devices
Embedded devices are pervasive nowadays with the rapid development of the Internet of Things (IoT). This brings significant security issues that make the security analysis of embedded devices important.
  • 109
  • 18 Dec 2023
Topic Review
Securing Internet of Things Applications Using Key Management
The Internet of Things (IoT) emerged when everyday objects began connecting to the Internet and interacting with each other autonomously without human intervention. IoT devices follow the IEEE 802.15.4 standard to enable network connectivity for resource-constrained devices using short-range, lightweight communication protocols.
  • 71
  • 07 Apr 2024
Topic Review
Secure Internet of Things Based on Blockchain
Centralized networks can host ubiquitous interconnected objects using Internet of Things (IoT) platforms. It is also possible to implement decentralized peer-to-peer solutions using blockchain technology, including smart homes and connected cars. However, both models have limitations regarding their ability to provide privacy and security due to limited resources, centralization management, and scalability, cost, and response time. The diversity of IoT network nodes is expected to result in different throughputs and rates. Centralized networks control and improve the performance of a large number of IoT devices. However, centralizing systems suffer from a number of disadvantages. A third party often has to manipulate the data collected by central cloud storage, which could lead to information leaks that could compromise the user’s privacy.
  • 200
  • 27 Oct 2023
Topic Review
Secure Cloud Infrastructure Review
Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost-effective manner. Security is the biggest concern for cloud computing and is a major obstacle to users adopting cloud computing systems. Maintaining the security of cloud computing is important, especially for the infrastructure.
  • 993
  • 13 Oct 2021
Topic Review
Secure Application of MIoT
With the increasing demand for higher-quality services, online English education platforms have gained significant attention. However, practical application of the Mobile Internet of Things (MIoT) still faces various challenges, including communication security, availability, scalability, etc. These challenges directly impact the utilization of online English education platforms. The dynamic and evolving nature of the topology characteristics in Mobile Internet of Things networks adds complexity to addressing these issues.
  • 405
  • 04 Aug 2023
Topic Review
Routing Protocol for Wireless Sensor Networks
Wireless sensor networks (WSNs), constrained by limited resources, demand routing strategies that prioritize energy efficiency. The tactic of cooperative routing, which leverages the broadcast nature of wireless channels, has garnered attention for its capability to amplify routing efficacy.
  • 286
  • 18 Dec 2023
Topic Review
Reversible Data Hiding Schemes Using Image Steganography
Encryption is a significant technique to secure data. Steganography and cryptography are two widely used techniques used to secure data. The steganographic technique is used to conceal the confidential information within data, whereas cryptography obfuscates the secret data to make it unreadable. The basic aim of the steganographic technique is to protect the copyrights, authorization, and ownership of the digital media transmitted over a network. A good stego-image should have high embedding capacity, robustness, imperceptibility, security, and less computational complexity.
  • 421
  • 27 Sep 2022
Topic Review
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
The developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The National Institute of Standards and Technology (NIST) has started looking for a post-quantum encryption algorithm that is resistant to the development of future quantum computers as a response to this security concern. 
  • 222
  • 21 Aug 2023
  • Page
  • of
  • 10