Security

A New Approach to Device Identification Using ICMetric and Chaotic Maps/Open Call Articles
MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities/Open Call Articles
Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions/Open Call Articles
Assuring M2M Secure Transactions via Blockchain and Smart Contracts/Open Call Articles
Towards Trust Model in Unmanned Aerial Vehicle Ad Hoc Networks/Open Call Articles
Secure Mobile IPv6 for Mobile Networks based on the 3GPP IP Multimedia Subsystem/Open Call Articles
DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks/Open Call Articles
An Efficient and Private Authentication Protocol for RFID Systems/Open Call Articles
A Blockchain Application Prototype for the Internet of Things/Open Call Articles
A Novel Unique Parameter for Increasing of Security in GPON Networks/Open Call Articles
Security Threats in Software Defined Mobile Clouds (SDMC)/Open Call Articles