Recent advances in smart contracts: A technical overview and state of the art

VY Kemmoe, W Stone, J Kim, D Kim, J Son - IEEE Access, 2020 - ieeexplore.ieee.org
Smart contracts, as an added functionality to blockchain, have received increased attention
recently. They are executable programs whose instance and state are stored in blockchain …

Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends

A Khan, A Ahmad, M Ahmed, J Sessa… - Complex & Intelligent …, 2022 - Springer
Scalable and secure authorization of smart things is of the crucial essence for the successful
deployment of the Internet of Things (IoT). Unauthorized access to smart things could …

End-to-end encryption in resource-constrained IoT device

ASD Alluhaidan, P Prabu - IEEE access, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) technologies will interconnect with a wide range of network devices,
regardless of their local network and resource capacities. Ensuring the security …

Sigstore: Software signing for everybody

Z Newman, JS Meyers, S Torres-Arias - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Software supply chain compromises are on the rise. From the effects of XCodeGhost to
SolarWinds, hackers have identified that targeting weak points in the supply chain allows …

A lightweight privacy-preserving communication protocol for heterogeneous IoT environment

X Luo, L Yin, C Li, C Wang, F Fang, C Zhu… - IEEE Access, 2020 - ieeexplore.ieee.org
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life,
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …

Merkle2: A Low-Latency Transparency Log System

Y Hu, K Hooshmand, H Kalidhindi… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Transparency logs are designed to help users audit untrusted servers. For example,
Certificate Transparency (CT) enables users to detect when a compromised Certificate …

{WAVE}: A decentralized authorization framework with transitive delegation

MP Andersen, S Kumar, M AbdelBaky… - 28th USENIX Security …, 2019 - usenix.org
Most deployed authorization systems rely on a central trusted service whose compromise
can lead to the breach of millions of user accounts and permissions. We present WAVE, an …

OST: On-demand TSCH scheduling with traffic-awareness

S Jeong, HS Kim, J Paek, S Bahk - IEEE INFOCOM 2020-IEEE …, 2020 - ieeexplore.ieee.org
As the emerging Internet of Things (IoT) devices and applications flourish, demand for
reliable and energy-efficient low-power wireless network protocols is surging. For this …

Data management for future wireless networks: Architecture, privacy preservation, and regulation

XS Shen, C Huang, D Liu, L Xue, W Zhuang… - IEEE …, 2021 - ieeexplore.ieee.org
Next-generation wireless networks (NGWN) aim to support diversified smart applications
that require frequent data exchanges and collaborative data processing among multiple …

Mqtt-i: Achieving end-to-end data flow integrity in mqtt

F Buccafurri, V De Angelis… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
MQTT has become the de facto standard in the IoT. Although standard MQTT lacks built-in
security features, several proposals have been made to address this gap. Unfortunately, no …