A survey on security and cryptographic perspective of Industrial-Internet-of-Things

N Mishra, SKH Islam, S Zeadally - Internet of Things, 2024 - Elsevier
Abstract The Industrial-Internet-of-Things (IIoT) powers several applications in the modern
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …

Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT

A Fu, X Zhang, N **ong, Y Gao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the strong analytical ability of big data, deep learning has been widely applied to
model on the collected data in industrial Internet of Things (IoT). However, for privacy issues …

Privacy-preserving federated learning in fog computing

C Zhou, A Fu, S Yu, W Yang, H Wang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Federated learning can combine a large number of scattered user groups and train models
collaboratively without uploading data sets, so as to avoid the server collecting user …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

A privacy-preserving and verifiable federated learning scheme

X Zhang, A Fu, H Wang, C Zhou… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Due to the complexity of the data environment, many organizations prefer to train deep
learning models together by sharing training sets. However, this process is always …

A lightweight authentication and attestation scheme for in-transit vehicles in IoV scenario

T Alladi, S Chakravarty, V Chamola… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the rise of new technological paradigms such as the Internet of Things (IoT) and the
Internet of Vehicles (IoV), we are going to see an unprecedented growth of connected …

FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain

AAN Patwary, A Fu, SK Battula, RK Naha… - Computer …, 2020 - Elsevier
Fog computing is an emerging computing paradigm which expands cloud-based computing
services near the network edge. With this new computing paradigm, new challenges arise in …

Privacy-Preserving Data-Driven Learning Models for Emerging Communication Networks: A Comprehensive Survey

MM Fouda, ZM Fadlullah, MI Ibrahem… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the proliferation of Beyond 5G (B5G) communication systems and heterogeneous
networks, mobile broadband users are generating massive volumes of data that undergo …

SARA: Secure asynchronous remote attestation for IoT systems

E Dushku, MM Rabbani, M Conti… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Remote attestation has emerged as a valuable security mechanism which aims to verify
remotely whether or not a potentially untrusted device has been compromised. The …