A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT
In recent years, the growing popularity of Internet of Things (IoT) is providing a promising
opportunity not only for the development of various home automation systems but also for …
opportunity not only for the development of various home automation systems but also for …
Blockchain-based reliable and efficient certificateless signature for IIoT devices
Nowadays, the Industrial Internet of Things (IIoT) has remarkably transformed our personal
lifestyles and society operations into a novel digital mode, which brings tremendous …
lifestyles and society operations into a novel digital mode, which brings tremendous …
A blockchain-based shamir's threshold cryptography scheme for data protection in industrial internet of things settings
K Yu, L Tan, C Yang, KKR Choo… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT), a typical Internet of Things (IoT) application,
integrates the global industrial system with other advanced computing, analysis, and …
integrates the global industrial system with other advanced computing, analysis, and …
Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning
With the rapid development of smart mobile terminals (MTs), various industrial Internet of
things (IIoT) applications can fully leverage them to collect and share data for providing …
things (IIoT) applications can fully leverage them to collect and share data for providing …
A blockchain-based privacy-preserving authentication scheme for VANETs
The privacy-preserving authentication is considered as the first line of defense against the
attacks in addition to preserving the identity privacy of the vehicles in the vehicular ad hoc …
attacks in addition to preserving the identity privacy of the vehicles in the vehicular ad hoc …
MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things
As an enabler for smart industrial Internet of Things (IoT), sensor cloud facilitates data
collection, processing, analysis, storage, and sharing on demand. However, compromised …
collection, processing, analysis, storage, and sharing on demand. However, compromised …
Replay-attack detection and prevention mechanism in industry 4.0 landscape for secure SECS/GEM communications
Starting from the First Industrial Revolution to the current and Fourth Industrial Revolution (or
Industry 4.0), various industrial machines are present in the market and manufacturing …
Industry 4.0), various industrial machines are present in the market and manufacturing …
Cryptographic solutions for industrial Internet-of-Things: Research challenges and opportunities
Industrial Internet of Things (IIoT) is an emerging trend, including in nontraditional
technological sector (eg, oil and gas industry). There are, however, a number of research …
technological sector (eg, oil and gas industry). There are, however, a number of research …
Secure multifactor authenticated key agreement scheme for industrial IoT
R Vinoth, LJ Deborah, P Vijayakumar… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The application of Internet of Things (IoT) has generally penetrated into people's life and
become popular in recent years. The IoT devices with different functions are integrated and …
become popular in recent years. The IoT devices with different functions are integrated and …