- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- Cryptography and Data Security
- Internet of Things and AI
- Chaos-based Image/Signal Encryption
- User Authentication and Security Systems
- Cloud Data Security Solutions
- Context-Aware Activity Recognition Systems
- Advanced Malware Detection Techniques
- Advanced Authentication Protocols Security
- EEG and Brain-Computer Interfaces
- Security in Wireless Sensor Networks
- Smart Systems and Machine Learning
Université Ibn-Tofail
2018-2024
The big challenge to raise for deploying the application's domain of Internet Things is security. As one popular messaging protocols in IoT world, message queue telemetry transport (MQTT) designed constrained devices and machine-to-machine communications, based on publish-subscribe model, it offers a basic authentication using username password. However, this method might have problem terms security scalability. In paper, we provide an analysis current research literature related MQTT...
Smart healthcare present the most important loT applications. The Internet of Things will revolutionize our life's mode including system. This paper show how is in and provide a summary some smart systems by enumerating strengths weaknesses for each one addition to an overview applications protocols used context: CoAP MQTT which should be chosen. Finally, we detail threats against highlight importance security developed context because attack can lead loss patient.
The Internet of Things is one the revolutions industry 4.0. It will change our lives mode. be present in every domain: healthcare, transportation, at home, agriculture generally city. Everyone connected to by IoT. Furthermore, realize this vision, communication through IoT must secure. So, it's greatest challenges faced scientist's community today their recent researches. This paper a study different security threats on category hand: data and network, privacy system IoT, other hand we...