Security and privacy in the industrial internet of things: Current standards and future challenges
… However, the IIoT is intended to support industrial systems, which rely on time-sensitive information,
eg, real-time sensor data and control commands, so any security mechanism would …
eg, real-time sensor data and control commands, so any security mechanism would …
IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
F Meneghello, M Calore, D Zucchetto… - … Internet of Things …, 2019 - ieeexplore.ieee.org
… environments, real-time personal localization, … security attacks against commercial IoT
devices have appeared in the mass media, contributing to raise public awareness of the security …
devices have appeared in the mass media, contributing to raise public awareness of the security …
A survey on internet of things security: Requirements, challenges, and solutions
… Monitoring environments by IoT devices need a reliable security mechanism for preventing
data breach and maintaining data confidentiality on the devices. In addition, for real-time …
data breach and maintaining data confidentiality on the devices. In addition, for real-time …
Security requirements for the internet of things: A systematic approach
S Pal, M Hitchens, T Rabehaja, S Mukhopadhyay - Sensors, 2020 - mdpi.com
… that the IoT may display, security provision must be able to react in real time to address
any threat. This group of requirements cover the issues of real-time, reliability, data freshness, …
any threat. This group of requirements cover the issues of real-time, reliability, data freshness, …
Lightweight cryptographic algorithms for guessing attack protection in complex internet of things applications
… It has been assessed in terms of the guessing attack in real-time … in real-time deep learning
networks for IoT applications. … is imperative to improve their security and performance Fig 1. …
networks for IoT applications. … is imperative to improve their security and performance Fig 1. …
A survey of secure internet of things in relation to blockchain
… Smart home-based IoT for real-time and secure remote health monitoring of triage and priority
system using body sensors: Multi-driven systematic review. Journal of Medical Systems, 43…
system using body sensors: Multi-driven systematic review. Journal of Medical Systems, 43…
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem
M Shuai, L Xiong, C Wang, N Yu - Computer Communications, 2020 - Elsevier
… sensor nodes is very important for real-time decisions. Since the user … Therefore, there is a
great need to design a secure … , we propose a new secure authentication scheme with forward …
great need to design a secure … , we propose a new secure authentication scheme with forward …
SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism
M Zaminkar, R Fotohi - Wireless Personal Communications, 2020 - Springer
… tailored to the NPS architecture has been authenticated using a real test-bed and composed
by a NPS sample mounted on a Raspberry Pi that receives open data feeds in real time via …
by a NPS sample mounted on a Raspberry Pi that receives open data feeds in real time via …
Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review
… Incremental Learning is one of the recent techniques being used with machine learning
techniques for real-time results. It is often used in image classification [116], target recognition […
techniques for real-time results. It is often used in image classification [116], target recognition […
Physically secure lightweight anonymous user authentication protocol for internet of things using physically unclonable functions
… (MUs) can mutually authenticate with a smart device SD through the GWN in order to negotiate
a session key for accessing the device real-time data. A standard security requirement for …
a session key for accessing the device real-time data. A standard security requirement for …