A survey on SCADA systems: secure protocols, incidents, threats and tactics

D Pliatsios, P Sarigiannidis, T Lagkas… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring
and control components of critical infrastructures, such as power, telecommunication …

Securing the Internet of Things: Challenges, threats and solutions

PIR Grammatikis, PG Sarigiannidis, ID Moscholios - Internet of Things, 2019 - Elsevier
Abstract The Internet of Things (IoT) is the next technological leap that will introduce
significant improvements to various aspects of the human environment, such as health …

[HTML][HTML] A survey on blockchain for industrial internet of things

RL Kumar, F Khan, S Kadry, S Rho - Alexandria Engineering Journal, 2022 - Elsevier
Blockchain and the Internet of Things (IoT) are separately regarded as highly capable
popular technologies. Blockchain is a database used for decentralized transaction …

Toward a lightweight intrusion detection system for the internet of things

SU Jan, S Ahmed, V Shakhov, I Koo - IEEE access, 2019 - ieeexplore.ieee.org
Integration of the Internet into the entities of the different domains of human society (such as
smart homes, health care, smart grids, manufacturing processes, product supply chains, and …

Network protocols, schemes, and mechanisms for internet of things (iot): Features, open challenges, and trends

A Triantafyllou, P Sarigiannidis… - … and mobile computing, 2018 - Wiley Online Library
Internet of Things (IoT) constitutes the next step in the field of technology, bringing enormous
changes in industry, medicine, environmental care, and urban development. Various …

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem

M Shuai, L **ong, C Wang, N Yu - Computer Communications, 2020 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a non-negligible subset of IoT, which focuses
on solving special requirements in industrial applications. In IIoT environments, remote …

Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms

S Pamarthi, R Narmadha - International Journal of Intelligent …, 2022 - emerald.com
Purpose Nowadays, more interest is found among the researchers in MANETs in practical
and theoretical areas and their performance under various environments. WSNs have …

Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design

JBF Sequeiros, FT Chimuco, MG Samaila… - ACM Computing …, 2020 - dl.acm.org
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …

Blockchain-enabled safety-as-a-service for industrial IoT applications

C Roy, S Misra, S Pal - IEEE Internet of Things Magazine, 2020 - ieeexplore.ieee.org
The integration of Industrial Internet of Things (IIoT)-based technologies with the existing
industrial manufacturing processes help to improve on-site safety of workers, reduce …

DVSP: Dynamic virtual sensor provisioning in sensor–cloud-based Internet of Things

T Ojha, S Misra, NS Raghuwanshi… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Virtual sensor provisioning is an essential process in sensor-cloud-based Internet of Things
(IoT), and it is responsible for the efficient utilization of physical resources in the system …