A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities

K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …

[HTML][HTML] Blockchain in healthcare and IoT: A systematic literature review

EM Adere - Array, 2022 - Elsevier
Blockchain technology is a highly regarded technology that possesses a plethora of exciting
features. This paper analyzes trends and highlights the potential benefits of blockchain …

Internet of things security: A top-down survey

DE Kouicem, A Bouabdallah, H Lakhlef - Computer Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) is one of the promising technologies that has attracted a lot
of attention in both industrial and academic fields these years. It aims to integrate seamlessly …

[HTML][HTML] A roadmap for security challenges in the Internet of Things

AR Sfar, E Natalizio, Y Challal, Z Chtourou - Digital Communications and …, 2018 - Elsevier
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT)
context are playing an active role in human activities, systems and processes. The high …

[HTML][HTML] Blockchain and Internet of Things in smart cities and drug supply management: Open issues, opportunities, and future directions

H Malik, T Anees, M Faheem, MU Chaudhry, A Ali… - Internet of things, 2023 - Elsevier
Blockchain-based drug supply management (DSM) requires powerful security and privacy
procedures for high-level authentication, interoperability, and medical record sharing …

Taxonomy and analysis of security protocols for Internet of Things

AK Das, S Zeadally, D He - Future Generation Computer Systems, 2018 - Elsevier
Abstract The Internet of Things (IoT) is a system of physical as well as virtual objects (each
with networking capabilities incorporated) that are interconnected to exchange and collect …

Provably secure ECC-based device access control and key agreement protocol for IoT environment

AK Das, M Wazid, AR Yannam, JJPC Rodrigues… - IEEE …, 2019 - ieeexplore.ieee.org
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

D Wang, P Wang - Computer Networks, 2014 - Elsevier
Anonymity is among the important properties of two-factor authentication schemes for
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …

A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things

S Shin, T Kwon - IEEE access, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have played an important role in the Internet of Things
(IoT), and the 5G network is being considered as a major candidate for IoT's communication …

Certificate-based anonymous device access control scheme for IoT environment

S Malani, J Srinivas, AK Das… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
As the “Internet communications infrastructure” develops to encircle smart devices, it is very
much essential for designing suitable methods for secure communications with these smart …