A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things
… IoT applications require real-time security with proper authentication of data. PoAh integrates
with the existing cryptographic concept of PoW excluding the reverse hash computation for …
with the existing cryptographic concept of PoW excluding the reverse hash computation for …
Blockchain and its Role in the Internet of Things (IoT)
T Alam - arXiv preprint arXiv:1902.09779, 2019 - arxiv.org
… can communicate in a realtime with authenticity, privacy and security in a decentralized … is
to get the secured data on the right location, on the right format, at real-time. The BC could be …
to get the secured data on the right location, on the right format, at real-time. The BC could be …
Near real-time security system applied to SDN environments in IoT networks using convolutional neural network
… The Internet of Things (IoT) paradigm brings new and … (DDoS) attacks due to their lack of
security. This kind of attack is … We propose in this paper a near real-time SDN security system …
security. This kind of attack is … We propose in this paper a near real-time SDN security system …
Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure
… to generate logs, capturing relevant real-time flows, and centralizing and correlating to
develop scenarios to counter cyberattacks with resilient and intelligent cyber security strategies. …
develop scenarios to counter cyberattacks with resilient and intelligent cyber security strategies. …
Blockchain-based secure data storage protocol for sensors in the industrial internet of things
J Lu, J Shen, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… Furthermore, the fog devices can be introduced into the scheme if sensors need real-time
feedback or there is a long distance between sensors with the cloud servers. Then, the devices…
feedback or there is a long distance between sensors with the cloud servers. Then, the devices…
Perception layer security in Internet of Things
… In order to identify and track the objects, user from wide area can connect with tags
automatically in real-time. Therefore, we can say that RFID is a prerequisite for IoT. As predicted by …
automatically in real-time. Therefore, we can say that RFID is a prerequisite for IoT. As predicted by …
Proposing a secure RPL based internet of things routing protocol: a review
… devices lead to the concept of the Internet of Things (IoT) that enables the transmission of data
… The network layer facilitates the secure transmission of data between the perception layer …
… The network layer facilitates the secure transmission of data between the perception layer …
Security of internet of things based on cryptographic algorithms: a survey
… Analysis of existing mechanisms show that ECC proves effective in managing real-time
security of embedded devices. The prospect of ECC performance is also promising considering …
security of embedded devices. The prospect of ECC performance is also promising considering …
Analysis of the security of internet of multimedia things
Z Lv, L Qiao, H Song - ACM Transactions on Multimedia Computing …, 2020 - dl.acm.org
… of the sharing of Internet of things perception data and the … of security and privacy issues,
such as real-time location of … to the development of the Internet of things [3]. Therefore, it is …
such as real-time location of … to the development of the Internet of things [3]. Therefore, it is …
Lightweight searchable encryption protocol for industrial internet of things
… ensuring data security. Although the lightweight IoT schemes can preserve privacy and
security … various sensors and smart meters can monitor the real-time status of microgrids [23]. In …
security … various sensors and smart meters can monitor the real-time status of microgrids [23]. In …