Cyber-physical systems security: Limitations, issues and future trends
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …
which can monitor and manipulate real objects and processes. They are closely related to …
Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
BAuth-ZKP—A blockchain-based multi-factor authentication mechanism for securing smart cities
The overwhelming popularity of technology-based solutions and innovations to address day-
to-day processes has significantly contributed to the emergence of smart cities. where …
to-day processes has significantly contributed to the emergence of smart cities. where …
A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …
high-speed data transfer. The data collected fuel many automation applications such as …
[HTML][HTML] Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions
Abstract Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a
reputation for not only building Machine Learning (ML) models that rely on distributed …
reputation for not only building Machine Learning (ML) models that rely on distributed …
A lightweight authentication and key exchange protocol with anonymity for IoT
The number of IoT devices is growing rapidly, and the interaction between devices and
servers is also more frequent. However, IoT devices are often at the edge of the network …
servers is also more frequent. However, IoT devices are often at the edge of the network …
CS-LAKA: A lightweight authenticated key agreement protocol with critical security properties for IoT environments
Y Guo, Y Guo - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
Anonymity, robust synchronization, and perfect forward secrecy are the most important
security properties of authenticated key agreement (AKA) protocols. Designing AKA …
security properties of authenticated key agreement (AKA) protocols. Designing AKA …
A cryptography and machine learning based authentication for secure data-sharing in federated cloud services environment
Secure mutual authentication is an indispensable requirement to share organizational
invaluable data among collaborating entities in federated cloud environment. This work …
invaluable data among collaborating entities in federated cloud environment. This work …
A robust device-to-device continuous authentication protocol for the internet of things
The Internet of Things (IoT) is a heterogeneous environment that connects billions of
devices. Thus, it is a significantly high-value target for attackers and suffers from several …
devices. Thus, it is a significantly high-value target for attackers and suffers from several …