Encryption as a service for IoT: opportunities, challenges and solutions
The widespread adoption of Internet of Things (IoT) technology has introduced new
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …
cybersecurity challenges. Encryption services are being offloaded to cloud and fog platforms …
Performance analysis of two cloud-based iot implementations: Empirical study
M Aleisa, AA Hussein, F Alsubaei… - 2020 7th IEEE …, 2020 - ieeexplore.ieee.org
The emergence of the Internet of things (IoT) has generated demand for computation
performed at the 'edge'of the network. With companies being increasingly challenged to …
performed at the 'edge'of the network. With companies being increasingly challenged to …
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives
MR Alagheband, A Mashatan - The Journal of Supercomputing, 2022 - Springer
Abstract The Internet of Things (IoT) is increasingly becoming widespread in different areas
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …
such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse …
CEaaS: Constrained encryption as a service in fog-enabled IoT
In this work, we present a solution toward facilitating dynamic encryption schemes—
Constrained Encryption as a Service (CEaaS)—in fog-enabled IoT environments. CEaaS is …
Constrained Encryption as a Service (CEaaS)—in fog-enabled IoT environments. CEaaS is …
Securing Cloud-Based Internet of Things: Challenges and Mitigations
The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a
paradigm shift in the digital landscape. However, these technological strides have also …
paradigm shift in the digital landscape. However, these technological strides have also …
Twenty security considerations for cloud-supported Internet of Things
J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …
Things”(IoT), it is essential to break down application and technology-based silos and …
Realizing an internet of secure things: A survey on issues and enabling technologies
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
Fortifying the IoT landscape: Strategies to counter security risks in connected systems
E James, F Rabbi - Tensorgate Journal of Sustainable …, 2023 - research.tensorgate.org
The proliferation of Internet of Things (IoT) devices in our connected world has brought
unparalleled convenience and efficiency to various sectors, ranging from smart homes to …
unparalleled convenience and efficiency to various sectors, ranging from smart homes to …
A panorama of cloud platforms for iot applications across industries
S Yangui - Sensors, 2020 - mdpi.com
Internet of Things (IoT) applications can play a critical role in business and industry.
Industrial IoT (IIoT) refers to the use of IoT technologies in manufacturing. Enabling IIoT …
Industrial IoT (IIoT) refers to the use of IoT technologies in manufacturing. Enabling IIoT …
Security challenges and strategies for the IoT in cloud computing
I Mohiuddin, A Almogren - 2020 11th international conference …, 2020 - ieeexplore.ieee.org
The Internet of Things is progressively turning into a pervasive computing service, needing
enormous volumes of data storage and processing. However, due to the distinctive …
enormous volumes of data storage and processing. However, due to the distinctive …