Cybersecurity in power grids: Challenges and opportunities

T Krause, R Ernst, B Klaer, I Hacker, M Henze - Sensors, 2021 - mdpi.com
Increasing volatilities within power transmission and distribution force power grid operators
to amplify their use of communication infrastructure to monitor and control their grid. The …

Improving IoT privacy, data protection and security concerns

C Lee, G Ahmed - International Journal of Technology …, 2021 - journals.gaftim.com
IoT has continued to evolve over the years with a promise to provide the users with effective
means to interact, communicate, transact and create strong relationship. The invention and …

A computer science perspective on digital transformation in production

P Brauner, M Dalibor, M Jarke, I Kunze… - ACM Transactions on …, 2022 - dl.acm.org
The Industrial Internet-of-Things (IIoT) promises significant improvements for the
manufacturing industry by facilitating the integration of manufacturing systems by Digital …

Verticals in 5G MEC-use cases and security challenges

TW Nowak, M Sepczuk, Z Kotulski, W Niewolski… - IEEE …, 2021 - ieeexplore.ieee.org
5G is the fifth-generation cellular network satisfying the requirements IMT-2020
(International Mobile Telecommunications-2020) of the International Telecommunication …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

Dataflow challenges in an internet of production: a security & privacy perspective

J Pennekamp, M Henze, S Schmidt… - Proceedings of the …, 2019 - dl.acm.org
The Internet of Production (IoP) envisions the interconnection of previously isolated CPS in
the area of manufacturing across institutional boundaries to realize benefits such as …

Easing the conscience with OPC UA: An internet-wide study on insecure deployments

M Dahlmanns, J Lohmöller, IB Fink… - Proceedings of the …, 2020 - dl.acm.org
Due to increasing digitalization, formerly isolated industrial networks, eg, for factory and
process automation, move closer and closer to the Internet, mandating secure …

Cost optimization of secure routing with untrusted devices in software defined networking

A Yazdinejad, RM Parizi, A Dehghantanha… - Journal of Parallel and …, 2020 - Elsevier
Over the years, switches and network routers have been compromised frequently, and a lot
of vulnerabilities have occurred in network infrastructure. Secure routing (SR) is one of the …

[PDF][PDF] Fortified Data Transmission for IoT: Leveraging Trustless Networks with Adaptive Security and Energy Efficiency

V Veeramachaneni - Journal of Advance Research in Mobile …, 2025 - researchgate.net
With the rapid adoption of IoT devices in various sectors, ensuring secure and efficient data
transmission in untrusted environments has become increasingly critical. This study …

Trust-based secure directed diffusion routing protocol in WSN

X Yu, F Li, T Li, N Wu, H Wang, H Zhou - Journal of Ambient Intelligence …, 2022 - Springer
Deployed in the monitoring environment, Wireless Sensor Network (WSN) is a measurement
and control network composed of miniature and low-cost sensors with sensing, computing …