High-Speed Network DDoS Attack Detection: A Survey

RMA Haseeb-Ur-Rehman, AHM Aman, MK Hasan… - Sensors, 2023 - mdpi.com
Having a large number of device connections provides attackers with multiple ways to attack
a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can …

Blockchain applications and architectures for port operations and logistics management

RW Ahmad, H Hasan, R Jayaraman, K Salah… - Research in …, 2021 - Elsevier
Efficient port logistic operations and management are critical for global trade and
transportation services. The current port logistic handling systems are highly centralized and …

Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies

S Hakak, WZ Khan, M Imran, KKR Choo… - Ieee …, 2020 - ieeexplore.ieee.org
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-
19 pandemic is no exception. For example, social distancing measures have resulted in …

A blockchain-based IoT-enabled E-Waste tracking and tracing system for smart cities

AUR Khan, RW Ahmad - IEEE Access, 2022 - ieeexplore.ieee.org
Recycling of electronic waste is a rapidly growing global issue that requires proper
monitoring and tracing of electronic devices and the business transactions between the …

CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things …

T ul Hassan, M Asim, T Baker… - Transactions on …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) fostered a new epoch of innovation by interconnecting
digital devices to make human life more convenient and attractive. These smart objects are …

A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices

S Kumari, M Singh, R Singh, H Tewari - Computer Networks, 2022 - Elsevier
Abstract The Internet of Things (IoT) introduces an active connection between smart devices
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …

Blockchain‐Based IoT‐Enabled System for Secure and Efficient Logistics Management in the Era of IR 4.0

NA Ugochukwu, SB Goyal… - Journal of …, 2022 - Wiley Online Library
As the global logistics business expands as a result of the industrial 4.0 revolution, logistics
operations continue to evolve as new technologies such as IoT, cloud, and big data are …

An authentication protocol for next generation of constrained Iot systems

S Rostampour, N Bagheri, Y Bendavid… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
With the exponential growth of connected Internet of Things (IoT) devices around the world,
security protection and privacy preservation have risen to the forefront of design and …

A post-quantum compliant authentication scheme for IoT healthcare systems

M Adeli, N Bagheri, HR Maimani… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In an Internet of Things (IoT)-based healthcare system, medical IoT devices gather and
transmit critical patient data. Ensuring the security and privacy of medical data is paramount …

A lightweight cyber security framework with context-awareness for pervasive computing environments

J Al-Muhtadi, K Saleem, S Al-Rabiaah, M Imran… - Sustainable Cities and …, 2021 - Elsevier
Internet of things (IoT) plays a key role in enabling smart sustainable cities. Pervasive
computing over the IoT platform makes life more convenient by embedding sensors based …