Exploring the full potentials of IoT for better financial growth and stability: A comprehensive survey

H Allioui, Y Mourdi - Sensors, 2023 - mdpi.com
Cutting-edge technologies, with a special emphasis on the Internet of Things (IoT), tend to
operate as game changers, generating enormous alterations in both traditional and modern …

[HTML][HTML] A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: problems, challenges and solutions

O Popoola, M Rodrigues, J Marchang… - Blockchain: Research …, 2024 - Elsevier
Protecting private data in smart homes, a popular Internet-of-Things (IoT) application,
remains a significant data security and privacy challenge due to the large-scale …

IoT survey: An SDN and fog computing perspective

O Salman, I Elhajj, A Chehab, A Kayssi - Computer Networks, 2018 - Elsevier
Recently, there has been an increasing interest in the Internet of Things (IoT). While some
analysts disvalue the IoT hype, several technology leaders, governments, and researchers …

[HTML][HTML] Security in product lifecycle of IoT devices: A survey

N Yousefnezhad, A Malhi, K Främling - Journal of Network and Computer …, 2020 - Elsevier
Abstract The Internet of Things (IoT) paradigm is considerably impacted by security
challenges, which has lately demanded substantial consideration. Accordingly, certain …

Authentication and Authorization for the Internet of Things

H Kim, EA Lee - IT Professional, 2017 - ieeexplore.ieee.org
Authentication and authorization are essential parts of basic security processes and are
sorely needed in the Internet of Things (IoT). The emergence of edge and fog computing …

Internet of Things architecture challenges: A systematic review

T Samizadeh Nikoui, AM Rahmani… - International Journal …, 2021 - Wiley Online Library
Summary The Internet of Things (IoT) is a rapidly growing trend within many domains, such
as automotive, avionics, automation, energy, and health. IoT architecture is the system of …

A robust device-to-device continuous authentication protocol for the internet of things

A Badhib, S Alshehri, A Cherif - IEEE Access, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is a heterogeneous environment that connects billions of
devices. Thus, it is a significantly high-value target for attackers and suffers from several …

Lightweight broadcast authentication protocol for edge-based applications

M Nakkar, R Altawy, A Youssef - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In this article, we propose a lightweight authentication protocol that provides forward secrecy
for edge-based applications. Motivated by the general consensus that centralized …

Resilient authentication and authorization for the Internet of Things (IoT) using edge computing

H Kim, E Kang, D Broman, EA Lee - ACM Transactions on Internet of …, 2020 - dl.acm.org
An emerging type of network architecture called edge computing has the potential to
improve the availability and resilience of IoT services under anomalous situations such as …

A component architecture for the internet of things

C Brooks, C Jerad, H Kim, EA Lee… - Proceedings of the …, 2018 - ieeexplore.ieee.org
In this paper, we describe a component-based software architecture for the Internet of
Things in which proxies for Things and services that we call “accessors” interact with one …