A Survey on Cyber–Physical Systems Security

Z Yu, H Gao, X Cong, N Wu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Cyber–physical systems (CPSs) are new types of intelligent systems that integrate
computing, control, and communication technologies, bridging the cyberspace and physical …

Systematic survey of mobile payments, protocols, and security infrastructure

S Bojjagani, VN Sastry, CM Chen, S Kumari… - Journal of Ambient …, 2023 - Springer
Mobile payments makeup one of the fastest-growing mobile services available today and
are widely used by smartphones for utility payments, bill payments, and online shop** …

SoK: Design, vulnerabilities and defense of cryptocurrency wallets

Y Erinle, Y Kethepalli, Y Feng, J Xu - arxiv preprint arxiv:2307.12874, 2023 - arxiv.org
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …

[HTML][HTML] Near-field communication (NFC) cyber threats and mitigation solutions in payment transactions: A review

P Onumadu, H Abroshan - Sensors, 2024 - mdpi.com
Today, many businesses use near-field communications (NFC) payment solutions, which
allow them to receive payments from customers quickly and smoothly. However, this …

Secure UHF RFID authentication with smart devices

A Li, J Li, Y Zhang, D Han, T Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Commodity ultra-high-frequency (UHF) RFID authentication systems only provide weak user
authentication, as RFID tags can be easily stolen, lost, or cloned by attackers. This paper …

Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model

H Yin - Journal of Information Security and Applications, 2023 - Elsevier
Today, Bluetooth technology has become the primary means of short-distance. In the
Bluetooth protocol stack, the Secure Simple Pairing (SSP) specifies three methods to …

Protecting the decentralized future: An exploration of common blockchain attacks and their countermeasures

B Saha, MM Hasan, N Anjum, S Tahora… - arxiv preprint arxiv …, 2023 - arxiv.org
Blockchain technology transformed the digital sphere by providing a transparent, secure,
and decentralized platform for data security across a range of industries, including …

Internet of things security requirements, threats, attacks, and countermeasures

M Abdel-Basset, N Moustafa, H Hawash… - … learning techniques for …, 2022 - Springer
This chapter elaborates on different security aspects to be taken into accounts during the
development and the deployments of IoT architecture. To make the reader about the security …

Long-range over-a-meter NFC link budget with distributed large-area coils

A Kharchevskii, I Yusupov, D Dobrykh, M Udrov… - Photonics and …, 2025 - Elsevier
Near-field communication is considered to have a high level of hardware security protection
owing to its natural short-range wireless operation, which makes a man-in-the-middle attack …

Towards securing public-key storage using hyperledger fabric

J Dreyer, R Tönjes… - 2022 IEEE international …, 2022 - ieeexplore.ieee.org
When given a cryptographic public verification key, a receiver needs to be sure about the
authenticity of the sender. Whenever an adversary is able to replace a well-intended public …