Exploring the full potentials of IoT for better financial growth and stability: A comprehensive survey
Cutting-edge technologies, with a special emphasis on the Internet of Things (IoT), tend to
operate as game changers, generating enormous alterations in both traditional and modern …
operate as game changers, generating enormous alterations in both traditional and modern …
[HTML][HTML] A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: problems, challenges and solutions
Protecting private data in smart homes, a popular Internet-of-Things (IoT) application,
remains a significant data security and privacy challenge due to the large-scale …
remains a significant data security and privacy challenge due to the large-scale …
IoT survey: An SDN and fog computing perspective
Recently, there has been an increasing interest in the Internet of Things (IoT). While some
analysts disvalue the IoT hype, several technology leaders, governments, and researchers …
analysts disvalue the IoT hype, several technology leaders, governments, and researchers …
[HTML][HTML] Security in product lifecycle of IoT devices: A survey
Abstract The Internet of Things (IoT) paradigm is considerably impacted by security
challenges, which has lately demanded substantial consideration. Accordingly, certain …
challenges, which has lately demanded substantial consideration. Accordingly, certain …
Authentication and Authorization for the Internet of Things
Authentication and authorization are essential parts of basic security processes and are
sorely needed in the Internet of Things (IoT). The emergence of edge and fog computing …
sorely needed in the Internet of Things (IoT). The emergence of edge and fog computing …
Internet of Things architecture challenges: A systematic review
Summary The Internet of Things (IoT) is a rapidly growing trend within many domains, such
as automotive, avionics, automation, energy, and health. IoT architecture is the system of …
as automotive, avionics, automation, energy, and health. IoT architecture is the system of …
A robust device-to-device continuous authentication protocol for the internet of things
The Internet of Things (IoT) is a heterogeneous environment that connects billions of
devices. Thus, it is a significantly high-value target for attackers and suffers from several …
devices. Thus, it is a significantly high-value target for attackers and suffers from several …
Lightweight broadcast authentication protocol for edge-based applications
In this article, we propose a lightweight authentication protocol that provides forward secrecy
for edge-based applications. Motivated by the general consensus that centralized …
for edge-based applications. Motivated by the general consensus that centralized …
Resilient authentication and authorization for the Internet of Things (IoT) using edge computing
An emerging type of network architecture called edge computing has the potential to
improve the availability and resilience of IoT services under anomalous situations such as …
improve the availability and resilience of IoT services under anomalous situations such as …
A component architecture for the internet of things
In this paper, we describe a component-based software architecture for the Internet of
Things in which proxies for Things and services that we call “accessors” interact with one …
Things in which proxies for Things and services that we call “accessors” interact with one …