Yazar "Khan, Mansoor" seçeneğine göre listele
Listeleniyor 1 - 2 / 2
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Enhancing IoT Security Through Hardware Security Modules (HSMs)(Institute of Electrical and Electronics Engineers Inc., 2024) Khan, Mansoor; Ilyas, Muhammad; Bayat, OguzStrong security measures must be integrated in an era where data security is critical, particularly for sensitive data handled by IoT devices. In order to strengthen Internet of Things security, the use of Hardware Security Modules (HSMs) is investigated in this research. We examine the development and effectiveness of HSMs in boosting IoT security through a thorough study of the literature. Our results demonstrate the vital role that HSMs play in protecting cryptographic keys and thwarting any attacks. We explore the difficulties of incorporating HSMs into IoT environments and suggest practical approaches. This research concludes by highlighting the role that HSMs play in strengthening IoT security architecture. © 2024 IEEE.Öğe Lightweight offline authentication scheme for secure remote working environment(IEEE, 2021) Coruh, Ugur; Khan, MansoorDuring pandemic situations, remote work security and reliability become more important for sustainability. The main problem in remote working is providing a reliable internet connection between remote working employees and remote systems. Lack of internet connection issues cause remote working problems, and some companies allow employees to work on untrusted personal computers, which causes untrusted and unmanageable IT systems. According to these problems, this study proposed a lightweight, offline authentication scheme for the secure remote work environment. The proposed model is designed for LPS (Lightweight Portable Security) devices, and these LPS devices provide portable USB bootable images with a secure environment for this connection and trust problems. LPS devices are single USB dongles to make users more dependent on these LPS devices. This design provides mobile application-dependent authentication to provide strong user authentication with 2FA (2 Factor Authentication), which is something you have (mobile phone and USB dongle) and something you know (mobile PIN). Also, the proposed model provides geofencing between USB dongles and Mobile phones to offer robust security.