A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues

M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Today is the era of the Internet of Things (IoT). The recent advances in hardware and
information technology have accelerated the deployment of billions of interconnected, smart …

[HTML][HTML] Biometrics for internet-of-things security: A review

W Yang, S Wang, NM Sahri, NM Karie, M Ahmed… - Sensors, 2021 - mdpi.com
The large number of Internet-of-Things (IoT) devices that need interaction between smart
devices and consumers makes security critical to an IoT environment. Biometrics offers an …

Analyzing the impact of social networks and social behavior on electronic business during COVID-19 pandemic

C Luo - Information Processing & Management, 2021 - Elsevier
The Covid-19 pandemic caused substantial changes, particularly concerning marketing,
which led to high digital use. Social networking enables people to communicate easily with …

Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems

AK Sutrala, MS Obaidat, S Saha, AK Das… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
With the tremendous growth of Information and Communications Technology (ICT), Cyber
Physical Systems (CPS) have opened the door for many potential applications ranging from …

An authenticated key exchange protocol for multi-server architecture in 5G networks

TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar… - IEEE …, 2020 - ieeexplore.ieee.org
Currently, the popularity of the Internet of Things (IoT) has brought about an increase in the
amount of data, so multi-server distributed cloud computing has been widely used in various …

A review of fingerprint sensors: Mechanism, characteristics, and applications

Y Yu, Q Niu, X Li, J Xue, W Liu, D Lin - Micromachines, 2023 - mdpi.com
Identification technology based on biometrics is a branch of research that employs the
unique individual traits of humans to authenticate identity, which is the most secure method …

Edge computing based healthcare systems: Enabling decentralized health monitoring in Internet of medical Things

P Dong, Z Ning, MS Obaidat, X Jiang, Y Guo… - IEEE …, 2020 - ieeexplore.ieee.org
The rapid development of IoMT facilitates pervasive healthcare networks. However,
numerous MUs lead to deficient wireless channel and computation resources. Edge …

Recent advances in wearable sensing technologies

AJ Perez, S Zeadally - Sensors, 2021 - mdpi.com
Wearable sensing technologies are having a worldwide impact on the creation of novel
business opportunities and application services that are benefiting the common citizen. By …

Threats and corrective measures for IoT security with observance of cybercrime: A survey

S Rani, A Kataria, V Sharma, S Ghosh… - Wireless …, 2021 - Wiley Online Library
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality
and comfort. IoT has contributed significantly to numerous application areas. The stormy …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …