Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

BAuth-ZKP—A blockchain-based multi-factor authentication mechanism for securing smart cities

MO Ahmad, G Tripathi, F Siddiqui, MA Alam, MA Ahad… - Sensors, 2023 - mdpi.com
The overwhelming popularity of technology-based solutions and innovations to address day-
to-day processes has significantly contributed to the emergence of smart cities. where …

A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …

[HTML][HTML] Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions

JPA Yaacoub, HN Noura, O Salman - Internet of Things and Cyber-Physical …, 2023 - Elsevier
Abstract Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a
reputation for not only building Machine Learning (ML) models that rely on distributed …

A lightweight authentication and key exchange protocol with anonymity for IoT

D He, Y Cai, S Zhu, Z Zhao, S Chan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The number of IoT devices is growing rapidly, and the interaction between devices and
servers is also more frequent. However, IoT devices are often at the edge of the network …

CS-LAKA: A lightweight authenticated key agreement protocol with critical security properties for IoT environments

Y Guo, Y Guo - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
Anonymity, robust synchronization, and perfect forward secrecy are the most important
security properties of authenticated key agreement (AKA) protocols. Designing AKA …

A cryptography and machine learning based authentication for secure data-sharing in federated cloud services environment

AK Singh, D Saxena - Journal of Applied Security Research, 2022 - Taylor & Francis
Secure mutual authentication is an indispensable requirement to share organizational
invaluable data among collaborating entities in federated cloud environment. This work …

A robust device-to-device continuous authentication protocol for the internet of things

A Badhib, S Alshehri, A Cherif - IEEE Access, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is a heterogeneous environment that connects billions of
devices. Thus, it is a significantly high-value target for attackers and suffers from several …