A survey on resilience in the iot: Taxonomy, classification, and discussion of resilience mechanisms

C Berger, P Eichhammer, HP Reiser… - ACM Computing …, 2021 - dl.acm.org
Internet-of-Things (IoT) ecosystems tend to grow both in scale and complexity, as they
consist of a variety of heterogeneous devices that span over multiple architectural IoT layers …

Formal methods and validation techniques for ensuring automotive systems security

M Krichen - Information, 2023 - mdpi.com
The increasing complexity and connectivity of automotive systems have raised concerns
about their vulnerability to security breaches. As a result, the integration of formal methods …

Survey on edge computing security

H Zeyu, X Geming, W Zhaohang… - … Conference on Big Data …, 2020 - ieeexplore.ieee.org
With the advent of the Internet of Everything, emerging application scenarios including
autonomous driving, immersive games based on VR or AR technology, and Industrial …

Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment

OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central
processing of the vast amount of IoT data. Although fog computing has the advantages of …

Current research trends in IoT security: a systematic map** study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

Security in fog computing: A systematic review on issues, challenges and solutions

R Rezapour, P Asghari, HHS Javadi… - Computer Science Review, 2021 - Elsevier
Fog computing refers to cloud computing development to the edge of a corporate network.
Fog computing, as a promising computing paradigm, facilitates computing, storing and …

A secure and efficient ECC-based scheme for edge computing and internet of things

H AlMajed, A AlMogren - Sensors, 2020 - mdpi.com
Recent growth in the Internet of Things (IoT) has raised security concerns over the
confidentiality of data exchanged between IoT devices and the edge. Many IoT systems …

SE-ENC: A secure and efficient encoding scheme using elliptic curve cryptography

HN Almajed, AS Almogren - IEEE Access, 2019 - ieeexplore.ieee.org
Many applications use asymmetric cryptography to secure communications between two
parties. One of the main issues with asymmetric cryptography is the need for vast amounts of …

Innovative energy-efficient proxy Re-encryption for secure data exchange in Wireless sensor networks

OA Khashan, NM Khafajah, W Alomoush… - IEEE …, 2024 - ieeexplore.ieee.org
In the realm of wireless sensor networks (WSNs), preserving data integrity, privacy, and
security against cyberthreats is paramount. Proxy re-encryption (PRE) plays a pivotal role in …

Secure architecture for Industrial Edge of Things (IEoT): A hierarchical perspective

P Li, J **a, Q Wang, Y Zhang, M Wu - Computer Networks, 2024 - Elsevier
Abstract The Industrial Internet of Things (IIoT) is an application of the IoT specifically
tailored for industrial manufacturing, characterized by its heightened requirements for …