A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT
In recent years, the growing popularity of Internet of Things (IoT) is providing a promising
opportunity not only for the development of various home automation systems but also for …
opportunity not only for the development of various home automation systems but also for …
Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT
B Jia, X Zhang, J Liu, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With rapid growth in data volume generated from different industrial devices in IoT, the
protection for sensitive and private data in data sharing has become crucial. At present …
protection for sensitive and private data in data sharing has become crucial. At present …
A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
Secure and lightweight user authentication scheme for cloud-assisted internet of things
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
Privacy-friendly platform for healthcare data in cloud based on blockchain environment
Data in cloud has always been a point of attraction for the cyber attackers. Nowadays
healthcare data in cloud has become their new interest. Attacks on these healthcare data …
healthcare data in cloud has become their new interest. Attacks on these healthcare data …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Cybersecurity of industrial cyber-physical systems: A review
Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the
processes based on the “physics” data gathered by edge sensor networks. Recent …
processes based on the “physics” data gathered by edge sensor networks. Recent …
AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart
transportation that takes intelligent commitments to the passengers to improve traffic safety …
transportation that takes intelligent commitments to the passengers to improve traffic safety …
Securing electronics healthcare records in healthcare 4.0: A biometric-based approach
In recent years, there has been an exponential increase in the usage of Healthcare 4.0-
based diagnostics systems across the globe. In healthcare 4.0, the patient's records are …
based diagnostics systems across the globe. In healthcare 4.0, the patient's records are …