A survey on SCADA systems: secure protocols, incidents, threats and tactics
Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring
and control components of critical infrastructures, such as power, telecommunication …
and control components of critical infrastructures, such as power, telecommunication …
Securing the Internet of Things: Challenges, threats and solutions
Abstract The Internet of Things (IoT) is the next technological leap that will introduce
significant improvements to various aspects of the human environment, such as health …
significant improvements to various aspects of the human environment, such as health …
[HTML][HTML] A survey on blockchain for industrial internet of things
Blockchain and the Internet of Things (IoT) are separately regarded as highly capable
popular technologies. Blockchain is a database used for decentralized transaction …
popular technologies. Blockchain is a database used for decentralized transaction …
Toward a lightweight intrusion detection system for the internet of things
Integration of the Internet into the entities of the different domains of human society (such as
smart homes, health care, smart grids, manufacturing processes, product supply chains, and …
smart homes, health care, smart grids, manufacturing processes, product supply chains, and …
Network protocols, schemes, and mechanisms for internet of things (iot): Features, open challenges, and trends
A Triantafyllou, P Sarigiannidis… - … and mobile computing, 2018 - Wiley Online Library
Internet of Things (IoT) constitutes the next step in the field of technology, bringing enormous
changes in industry, medicine, environmental care, and urban development. Various …
changes in industry, medicine, environmental care, and urban development. Various …
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem
M Shuai, L **ong, C Wang, N Yu - Computer Communications, 2020 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a non-negligible subset of IoT, which focuses
on solving special requirements in industrial applications. In IIoT environments, remote …
on solving special requirements in industrial applications. In IIoT environments, remote …
Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms
S Pamarthi, R Narmadha - International Journal of Intelligent …, 2022 - emerald.com
Purpose Nowadays, more interest is found among the researchers in MANETs in practical
and theoretical areas and their performance under various environments. WSNs have …
and theoretical areas and their performance under various environments. WSNs have …
Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …
emergence of new computing paradigms that have gained importance across a wide …
Blockchain-enabled safety-as-a-service for industrial IoT applications
The integration of Industrial Internet of Things (IIoT)-based technologies with the existing
industrial manufacturing processes help to improve on-site safety of workers, reduce …
industrial manufacturing processes help to improve on-site safety of workers, reduce …
DVSP: Dynamic virtual sensor provisioning in sensor–cloud-based Internet of Things
Virtual sensor provisioning is an essential process in sensor-cloud-based Internet of Things
(IoT), and it is responsible for the efficient utilization of physical resources in the system …
(IoT), and it is responsible for the efficient utilization of physical resources in the system …