Security and privacy in the industrial internet of things: Current standards and future challenges

T Gebremichael, LPI Ledwaba, MH Eldefrawy… - IEEE …, 2020 - ieeexplore.ieee.org
… However, the IIoT is intended to support industrial systems, which rely on time-sensitive information,
eg, real-time sensor data and control commands, so any security mechanism would …

IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - … Internet of Things …, 2019 - ieeexplore.ieee.org
… environments, real-time personal localization, … security attacks against commercial IoT
devices have appeared in the mass media, contributing to raise public awareness of the security

A survey on internet of things security: Requirements, challenges, and solutions

H HaddadPajouh, A Dehghantanha, RM Parizi… - Internet of Things, 2021 - Elsevier
… Monitoring environments by IoT devices need a reliable security mechanism for preventing
data breach and maintaining data confidentiality on the devices. In addition, for real-time

Security requirements for the internet of things: A systematic approach

S Pal, M Hitchens, T Rabehaja, S Mukhopadhyay - Sensors, 2020 - mdpi.com
… that the IoT may display, security provision must be able to react in real time to address
any threat. This group of requirements cover the issues of real-time, reliability, data freshness, …

Lightweight cryptographic algorithms for guessing attack protection in complex internet of things applications

MK Hasan, M Shafiq, S Islam, B Pandey… - …, 2021 - Wiley Online Library
… It has been assessed in terms of the guessing attack in real-time … in real-time deep learning
networks for IoT applications. … is imperative to improve their security and performance Fig 1. …

A survey of secure internet of things in relation to blockchain

M Alizadeh, K Andersson, O Schelen - … and Information Security  …, 2020 - diva-portal.org
… Smart home-based IoT for real-time and secure remote health monitoring of triage and priority
system using body sensors: Multi-driven systematic review. Journal of Medical Systems, 43…

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem

M Shuai, L Xiong, C Wang, N Yu - Computer Communications, 2020 - Elsevier
… sensor nodes is very important for real-time decisions. Since the user … Therefore, there is a
great need to design a secure … , we propose a new secure authentication scheme with forward …

SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism

M Zaminkar, R Fotohi - Wireless Personal Communications, 2020 - Springer
… tailored to the NPS architecture has been authenticated using a real test-bed and composed
by a NPS sample mounted on a Raspberry Pi that receives open data feeds in real time via …

Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review

N Mishra, S Pandya - IEEE Access, 2021 - ieeexplore.ieee.org
… Incremental Learning is one of the recent techniques being used with machine learning
techniques for real-time results. It is often used in image classification [116], target recognition […

Physically secure lightweight anonymous user authentication protocol for internet of things using physically unclonable functions

S Banerjee, V Odelu, AK Das, S Chattopadhyay… - IEEe …, 2019 - ieeexplore.ieee.org
… (MUs) can mutually authenticate with a smart device SD through the GWN in order to negotiate
a session key for accessing the device real-time data. A standard security requirement for …