Cybersecurity in power grids: Challenges and opportunities
Increasing volatilities within power transmission and distribution force power grid operators
to amplify their use of communication infrastructure to monitor and control their grid. The …
to amplify their use of communication infrastructure to monitor and control their grid. The …
Improving IoT privacy, data protection and security concerns
C Lee, G Ahmed - International Journal of Technology …, 2021 - journals.gaftim.com
IoT has continued to evolve over the years with a promise to provide the users with effective
means to interact, communicate, transact and create strong relationship. The invention and …
means to interact, communicate, transact and create strong relationship. The invention and …
A computer science perspective on digital transformation in production
The Industrial Internet-of-Things (IIoT) promises significant improvements for the
manufacturing industry by facilitating the integration of manufacturing systems by Digital …
manufacturing industry by facilitating the integration of manufacturing systems by Digital …
Verticals in 5G MEC-use cases and security challenges
5G is the fifth-generation cellular network satisfying the requirements IMT-2020
(International Mobile Telecommunications-2020) of the International Telecommunication …
(International Mobile Telecommunications-2020) of the International Telecommunication …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
Dataflow challenges in an internet of production: a security & privacy perspective
The Internet of Production (IoP) envisions the interconnection of previously isolated CPS in
the area of manufacturing across institutional boundaries to realize benefits such as …
the area of manufacturing across institutional boundaries to realize benefits such as …
Easing the conscience with OPC UA: An internet-wide study on insecure deployments
Due to increasing digitalization, formerly isolated industrial networks, eg, for factory and
process automation, move closer and closer to the Internet, mandating secure …
process automation, move closer and closer to the Internet, mandating secure …
Cost optimization of secure routing with untrusted devices in software defined networking
Over the years, switches and network routers have been compromised frequently, and a lot
of vulnerabilities have occurred in network infrastructure. Secure routing (SR) is one of the …
of vulnerabilities have occurred in network infrastructure. Secure routing (SR) is one of the …
[PDF][PDF] Fortified Data Transmission for IoT: Leveraging Trustless Networks with Adaptive Security and Energy Efficiency
V Veeramachaneni - Journal of Advance Research in Mobile …, 2025 - researchgate.net
With the rapid adoption of IoT devices in various sectors, ensuring secure and efficient data
transmission in untrusted environments has become increasingly critical. This study …
transmission in untrusted environments has become increasingly critical. This study …
Trust-based secure directed diffusion routing protocol in WSN
Deployed in the monitoring environment, Wireless Sensor Network (WSN) is a measurement
and control network composed of miniature and low-cost sensors with sensing, computing …
and control network composed of miniature and low-cost sensors with sensing, computing …