A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
[HTML][HTML] Blockchain in healthcare and IoT: A systematic literature review
EM Adere - Array, 2022 - Elsevier
Blockchain technology is a highly regarded technology that possesses a plethora of exciting
features. This paper analyzes trends and highlights the potential benefits of blockchain …
features. This paper analyzes trends and highlights the potential benefits of blockchain …
Internet of things security: A top-down survey
DE Kouicem, A Bouabdallah, H Lakhlef - Computer Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) is one of the promising technologies that has attracted a lot
of attention in both industrial and academic fields these years. It aims to integrate seamlessly …
of attention in both industrial and academic fields these years. It aims to integrate seamlessly …
[HTML][HTML] A roadmap for security challenges in the Internet of Things
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT)
context are playing an active role in human activities, systems and processes. The high …
context are playing an active role in human activities, systems and processes. The high …
[HTML][HTML] Blockchain and Internet of Things in smart cities and drug supply management: Open issues, opportunities, and future directions
Blockchain-based drug supply management (DSM) requires powerful security and privacy
procedures for high-level authentication, interoperability, and medical record sharing …
procedures for high-level authentication, interoperability, and medical record sharing …
Taxonomy and analysis of security protocols for Internet of Things
Abstract The Internet of Things (IoT) is a system of physical as well as virtual objects (each
with networking capabilities incorporated) that are interconnected to exchange and collect …
with networking capabilities incorporated) that are interconnected to exchange and collect …
Provably secure ECC-based device access control and key agreement protocol for IoT environment
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …
Things (IoT) environment, it is essential to design a secure device access control and key …
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Anonymity is among the important properties of two-factor authentication schemes for
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …
A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things
S Shin, T Kwon - IEEE access, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have played an important role in the Internet of Things
(IoT), and the 5G network is being considered as a major candidate for IoT's communication …
(IoT), and the 5G network is being considered as a major candidate for IoT's communication …
Certificate-based anonymous device access control scheme for IoT environment
As the “Internet communications infrastructure” develops to encircle smart devices, it is very
much essential for designing suitable methods for secure communications with these smart …
much essential for designing suitable methods for secure communications with these smart …