A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities

K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …

A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT

J Sengupta, S Ruj, SD Bit - Journal of network and computer applications, 2020 - Elsevier
In recent years, the growing popularity of Internet of Things (IoT) is providing a promising
opportunity not only for the development of various home automation systems but also for …

Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT

B Jia, X Zhang, J Liu, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With rapid growth in data volume generated from different industrial devices in IoT, the
protection for sensitive and private data in data sharing has become crucial. At present …

A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care

M Masud, GS Gaba, S Alqahtani… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …

Secure and lightweight user authentication scheme for cloud-assisted internet of things

C Wang, D Wang, Y Duan, X Tao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …

Privacy-friendly platform for healthcare data in cloud based on blockchain environment

A Al Omar, MZA Bhuiyan, A Basu, S Kiyomoto… - Future generation …, 2019 - Elsevier
Data in cloud has always been a point of attraction for the cyber attackers. Nowadays
healthcare data in cloud has become their new interest. Attacks on these healthcare data …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Cybersecurity of industrial cyber-physical systems: A review

H Kayan, M Nunes, O Rana, P Burnap… - ACM Computing Surveys …, 2022 - dl.acm.org
Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the
processes based on the “physics” data gathered by edge sensor networks. Recent …

AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment

M Wazid, P Bagga, AK Das, S Shetty… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart
transportation that takes intelligent commitments to the passengers to improve traffic safety …

Securing electronics healthcare records in healthcare 4.0: A biometric-based approach

JJ Hathaliya, S Tanwar, S Tyagi, N Kumar - Computers & Electrical …, 2019 - Elsevier
In recent years, there has been an exponential increase in the usage of Healthcare 4.0-
based diagnostics systems across the globe. In healthcare 4.0, the patient's records are …