Utilizing blockchain to overcome cyber security concerns in the internet of things: A review

B Alotaibi - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
SECURITY REQUIREMENTS AND CONSTRAINTS This section discusses IoT security
requirements, IoT devices and network constraints and challenges. An idealistic IoT environment …

Industrial internet of things (IIoT): opportunities, challenges, and requirements in manufacturing businesses in emerging economies

O Peter, A Pradhan, C Mbohwa - Procedia Computer Science, 2023 - Elsevier
… supports the three key requirements for digital function on … , we could identify requirements
to extend the existing body of … In summary, our research supports the three key requirements

Proposing a secure RPL based internet of things routing protocol: a review

ZA Almusaylim, A Alhumam, NZ Jhanjhi - Ad Hoc Networks, 2020 - Elsevier
Things in smart cities are intractable via the Internet. These things are naturally deployed in
a distributed environment wirelessly. They become vulnerable to the diverse security attacks …

Improving internet of things (IoT) security with software-defined networking (SDN)

A Al Hayajneh, MZA Bhuiyan, I McAndrew - Computers, 2020 - mdpi.com
… These devices are smart and connected to the Internet. Due to this dynamic type of environment,
traditional networks are not the best option to meet the requirements of IoT. There is a …

Internet of Things and its applications: A comprehensive survey

R Hassan, F Qamar, MK Hasan, AHM Aman… - Symmetry, 2020 - mdpi.com
… In this paper, the authors discuss the needs and necessities of adaptive security
establishing security requirements and applying ample security controls, as long as security

Secure Internet of Things (IoT)-based smart-world critical infrastructures: Survey, case study and research opportunities

X Liu, C Qian, WG Hatcher, H Xu, W Liao, W Yu - IEEE Access, 2019 - ieeexplore.ieee.org
… Dragoni, “Towards a systematic survey of industrial iot security requirements: research method
and quantitative analysis,” in Proceedings of the Workshop on Fog Computing and the IoT…

Security challenges and opportunities for smart contracts in Internet of Things: A survey

K Peng, M Li, H Huang, C Wang, S Wan… - … Internet of Things …, 2021 - ieeexplore.ieee.org
… Cao, and MA Imran, “Blockchain-enabled wireless Internet of Things: Performance analysis
and optimal communication node deployment,” IEEE Internet Things J., vol. 6, no. 3, pp. …

[PDF][PDF] Cyber security and privacy issues in industrial internet of things.

NZ Jhanjhi, M Humayun… - … Systems Science & …, 2021 - cdn.techscience.cn
internet with the intent of improving productivity and efficiency. These internet-enabled
industries are key targets of Cyber Security (… 3, and each layer has its security requirements that …

[PDF][PDF] An ontology based approach for context-aware security in the internet of things (IoT)

A Nazir, S Sholla, A Bashir - International Journal of Wireless and …, 2021 - researchgate.net
… An ontology of security requirements for web applications, describing concepts of … The
main aim of this research is to enable the reuse of knowledge about security requirements while …

A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
… This paper presents a general overview of the security concerns and requirements in the
IoT environment in a layer-based approach. Then, it provides an up-to-date survey of the …