A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities

K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …

A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT

J Sengupta, S Ruj, SD Bit - Journal of network and computer applications, 2020 - Elsevier
In recent years, the growing popularity of Internet of Things (IoT) is providing a promising
opportunity not only for the development of various home automation systems but also for …

Blockchain-based reliable and efficient certificateless signature for IIoT devices

W Wang, H Xu, M Alazab, TR Gadekallu… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Nowadays, the Industrial Internet of Things (IIoT) has remarkably transformed our personal
lifestyles and society operations into a novel digital mode, which brings tremendous …

A blockchain-based shamir's threshold cryptography scheme for data protection in industrial internet of things settings

K Yu, L Tan, C Yang, KKR Choo… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT), a typical Internet of Things (IoT) application,
integrates the global industrial system with other advanced computing, analysis, and …

Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning

CH Liu, Q Lin, S Wen - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
With the rapid development of smart mobile terminals (MTs), various industrial Internet of
things (IIoT) applications can fully leverage them to collect and share data for providing …

A blockchain-based privacy-preserving authentication scheme for VANETs

Z Lu, Q Wang, G Qu, H Zhang… - IEEE Transactions on Very …, 2019 - ieeexplore.ieee.org
The privacy-preserving authentication is considered as the first line of defense against the
attacks in addition to preserving the identity privacy of the vehicles in the vehicular ad hoc …

MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things

T Wang, H Luo, W Jia, A Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As an enabler for smart industrial Internet of Things (IoT), sensor cloud facilitates data
collection, processing, analysis, storage, and sharing on demand. However, compromised …

Replay-attack detection and prevention mechanism in industry 4.0 landscape for secure SECS/GEM communications

MA Al-Shareeda, S Manickam, SA Laghari, A Jaisan - Sustainability, 2022 - mdpi.com
Starting from the First Industrial Revolution to the current and Fourth Industrial Revolution (or
Industry 4.0), various industrial machines are present in the market and manufacturing …

Cryptographic solutions for industrial Internet-of-Things: Research challenges and opportunities

KKR Choo, S Gritzalis, JH Park - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) is an emerging trend, including in nontraditional
technological sector (eg, oil and gas industry). There are, however, a number of research …

Secure multifactor authenticated key agreement scheme for industrial IoT

R Vinoth, LJ Deborah, P Vijayakumar… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The application of Internet of Things (IoT) has generally penetrated into people's life and
become popular in recent years. The IoT devices with different functions are integrated and …