A survey on resilience in the iot: Taxonomy, classification, and discussion of resilience mechanisms
Internet-of-Things (IoT) ecosystems tend to grow both in scale and complexity, as they
consist of a variety of heterogeneous devices that span over multiple architectural IoT layers …
consist of a variety of heterogeneous devices that span over multiple architectural IoT layers …
Formal methods and validation techniques for ensuring automotive systems security
M Krichen - Information, 2023 - mdpi.com
The increasing complexity and connectivity of automotive systems have raised concerns
about their vulnerability to security breaches. As a result, the integration of formal methods …
about their vulnerability to security breaches. As a result, the integration of formal methods …
Survey on edge computing security
H Zeyu, X Geming, W Zhaohang… - … Conference on Big Data …, 2020 - ieeexplore.ieee.org
With the advent of the Internet of Everything, emerging application scenarios including
autonomous driving, immersive games based on VR or AR technology, and Industrial …
autonomous driving, immersive games based on VR or AR technology, and Industrial …
Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment
OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central
processing of the vast amount of IoT data. Although fog computing has the advantages of …
processing of the vast amount of IoT data. Although fog computing has the advantages of …
Current research trends in IoT security: a systematic map** study
JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …
Security in fog computing: A systematic review on issues, challenges and solutions
Fog computing refers to cloud computing development to the edge of a corporate network.
Fog computing, as a promising computing paradigm, facilitates computing, storing and …
Fog computing, as a promising computing paradigm, facilitates computing, storing and …
A secure and efficient ECC-based scheme for edge computing and internet of things
Recent growth in the Internet of Things (IoT) has raised security concerns over the
confidentiality of data exchanged between IoT devices and the edge. Many IoT systems …
confidentiality of data exchanged between IoT devices and the edge. Many IoT systems …
SE-ENC: A secure and efficient encoding scheme using elliptic curve cryptography
Many applications use asymmetric cryptography to secure communications between two
parties. One of the main issues with asymmetric cryptography is the need for vast amounts of …
parties. One of the main issues with asymmetric cryptography is the need for vast amounts of …
Innovative energy-efficient proxy Re-encryption for secure data exchange in Wireless sensor networks
In the realm of wireless sensor networks (WSNs), preserving data integrity, privacy, and
security against cyberthreats is paramount. Proxy re-encryption (PRE) plays a pivotal role in …
security against cyberthreats is paramount. Proxy re-encryption (PRE) plays a pivotal role in …
Secure architecture for Industrial Edge of Things (IEoT): A hierarchical perspective
P Li, J **a, Q Wang, Y Zhang, M Wu - Computer Networks, 2024 - Elsevier
Abstract The Industrial Internet of Things (IIoT) is an application of the IoT specifically
tailored for industrial manufacturing, characterized by its heightened requirements for …
tailored for industrial manufacturing, characterized by its heightened requirements for …