Articles with "robust security" as a keyword



Photo by scottwebb from unsplash

A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3267718

Abstract: Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.… read more here.

Keywords: security scheme; mqtt; security; robust security ... See more keywords
Photo by edhoradic from unsplash

Robust security transmission design for multi-user peer-to-peer wireless relay networks

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/15501329221107582

Abstract: In this article, we studied the robust security transmission design for multi-user peer-to-peer relay networks, where all users demand secure communication and the eavesdropper is passive. Although the previous researches have designed the physical-layer security… read more here.

Keywords: transmission design; peer; robust security;
Photo by joakimnadell from unsplash

A Robust Security Architecture for SDN-Based 5G Networks

Sign Up to like & get
recommendations!
Published in 2019 at "Future Internet"

DOI: 10.3390/fi11040085

Abstract: 5G is the latest generation of cellular mobile communications. Due to its significant advantage in high data rate, reduced latency and massive device connectivity, the 5G network plays a vital role in today’s commercial telecommunications… read more here.

Keywords: security architecture; architecture sdn; sdn; robust security ... See more keywords