Home / Journals / JIOT / Vol.8, No.1, 2026
Special Issues
  • Open AccessOpen Access

    ARTICLE

    Hybrid Encryption Model for Secure Token Distribution Scheme

    Michael Juma Ayuma1,*, Shem Mbandu Angolo1,*, Philemon Nthenge Kasyoka2
    Journal on Internet of Things, Vol.8, pp. 31-65, 2026, DOI:10.32604/jiot.2026.074919 - 16 March 2026
    Abstract Encryption is essential for safeguarding sensitive data by transforming it into a secret code, which can only be decrypted by authorized parties. This ensures privacy and protects data from unauthorized access. While various encryption algorithms exist, relying on a single method may not provide sufficient security, particularly in the context of token transmission. Common threats such as brute force attacks, man-in-the-middle (MITM) attacks, token modification, and replay attacks are prevalent in adversarial attempts to breach the security of tokens during transmission. When these vulnerabilities are not addressed, they can compromise token integrity and the security… More >

  • Open AccessOpen Access

    ARTICLE

    Multisecurity GAN-Steganography-Blockchain for IoT-Cloud Self-Service Banking

    Mangala Natampalli1,2,*, Kruthika Gottikere Channagangaiah3, Bodi Eswara Reddy1, Rajkumar Buyya4, Venugopal Kupanna Rajuk3, Sundaraja Sitharama Iyengar5, Lalit Mohan Patnaik6
    Journal on Internet of Things, Vol.8, pp. 1-30, 2026, DOI:10.32604/jiot.2026.067726 - 24 February 2026
    Abstract Contemporary banking focuses on self-service and customer-centric experience by harnessing Internet of Things (IoT) and Cloud Computing. However, these systems remain vulnerable to multifaceted cyberattacks. The IoT-Cloud-based systems can be safeguarded through authentication, confidentiality, integrity, availability, privacy, and non-repudiation. This work proposes a multi-stage security consisting of Generative Adversarial Networks (GAN) for facial authentication, hybrid Curvelet and Least-Significant-Bit (LSB) Steganography for data protection, and Ethereum Blockchain for transactions and storage security to provide complete protection to the self-service pipeline. Customers are authenticated using live images from IoT cameras by GAN facial recognition. Improved data concealment… More >

Per Page:

Share Link