Current research on Internet of Things (IoT) security: A survey

WH Hassan - Computer networks, 2019 - Elsevier
The results of IoT failures can be severe, therefore, the study and research in security issues
in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy …

Blockchain for IoT access control: Recent trends and future research directions

S Pal, A Dorri, R Jurdak - Journal of Network and Computer Applications, 2022 - Elsevier
With the rapid development of wireless sensor networks, smart devices, and traditional
information and communication technologies, there is tremendous growth in the use of …

Access control in Internet-of-Things: A survey

S Ravidas, A Lekidis, F Paci, N Zannone - Journal of Network and …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is an emerging technology that is revolutionizing the
global economy and society. IoT enables a collaborative environment where different …

Trust-based blockchain authorization for IoT

GD Putra, V Dedeoglu, SS Kanhere… - … on Network and …, 2021 - ieeexplore.ieee.org
Authorization or access control limits the actions a user may perform on a computer system,
based on predetermined access control policies, thus preventing access by illegitimate …

Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …

A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions

M Burhan, H Alam, A Arsalan, RA Rehman… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …

Mobile edge computing empowers internet of things

N Ansari, X Sun - IEICE Transactions on Communications, 2018 - search.ieice.org
In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by
leveraging the fiber-wireless access technology, the cloudlet concept, and the software …

Access control and authorization in smart homes: A survey

ZN Mohammad, F Farha… - Tsinghua Science …, 2021 - ieeexplore.ieee.org
With the rapid development of cyberspace and smart home technology, human life is
changing to a new virtual dimension with several promises for improving its quality …

An attribute-based approach toward a secured smart-home IoT access control and a comparison with a role-based approach

S Ameer, J Benson, R Sandhu - Information, 2022 - mdpi.com
The area of smart homes is one of the most popular for deploying smart connected devices.
One of the most vulnerable aspects of smart homes is access control. Recent advances in …

Policy-based access control for constrained healthcare resources in the context of the Internet of Things

S Pal, M Hitchens, V Varadharajan… - Journal of Network and …, 2019 - Elsevier
Abstract The Internet of Things (IoT), smart sensors and mobile wearable devices are
hel** to provide healthcare systems that are more ubiquitous, smarter, faster and easily …