A survey on security and cryptographic perspective of Industrial-Internet-of-Things
Abstract The Industrial-Internet-of-Things (IIoT) powers several applications in the modern
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …
Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT
Due to the strong analytical ability of big data, deep learning has been widely applied to
model on the collected data in industrial Internet of Things (IoT). However, for privacy issues …
model on the collected data in industrial Internet of Things (IoT). However, for privacy issues …
Privacy-preserving federated learning in fog computing
Federated learning can combine a large number of scattered user groups and train models
collaboratively without uploading data sets, so as to avoid the server collecting user …
collaboratively without uploading data sets, so as to avoid the server collecting user …
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …
considering the fact that 5G technology facilitates numerous services building on IoT …
A privacy-preserving and verifiable federated learning scheme
Due to the complexity of the data environment, many organizations prefer to train deep
learning models together by sharing training sets. However, this process is always …
learning models together by sharing training sets. However, this process is always …
A lightweight authentication and attestation scheme for in-transit vehicles in IoV scenario
With the rise of new technological paradigms such as the Internet of Things (IoT) and the
Internet of Vehicles (IoV), we are going to see an unprecedented growth of connected …
Internet of Vehicles (IoV), we are going to see an unprecedented growth of connected …
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain
Fog computing is an emerging computing paradigm which expands cloud-based computing
services near the network edge. With this new computing paradigm, new challenges arise in …
services near the network edge. With this new computing paradigm, new challenges arise in …
Privacy-Preserving Data-Driven Learning Models for Emerging Communication Networks: A Comprehensive Survey
With the proliferation of Beyond 5G (B5G) communication systems and heterogeneous
networks, mobile broadband users are generating massive volumes of data that undergo …
networks, mobile broadband users are generating massive volumes of data that undergo …
SARA: Secure asynchronous remote attestation for IoT systems
Remote attestation has emerged as a valuable security mechanism which aims to verify
remotely whether or not a potentially untrusted device has been compromised. The …
remotely whether or not a potentially untrusted device has been compromised. The …