Utilizing blockchain to overcome cyber security concerns in the internet of things: A review
B Alotaibi - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
… SECURITY REQUIREMENTS AND CONSTRAINTS This section discusses IoT security
requirements, IoT devices and network constraints and challenges. An idealistic IoT environment …
requirements, IoT devices and network constraints and challenges. An idealistic IoT environment …
Industrial internet of things (IIoT): opportunities, challenges, and requirements in manufacturing businesses in emerging economies
… supports the three key requirements for digital function on … , we could identify requirements
to extend the existing body of … In summary, our research supports the three key requirements …
to extend the existing body of … In summary, our research supports the three key requirements …
Proposing a secure RPL based internet of things routing protocol: a review
… Things in smart cities are intractable via the Internet. These things are naturally deployed in
a distributed environment wirelessly. They become vulnerable to the diverse security attacks …
a distributed environment wirelessly. They become vulnerable to the diverse security attacks …
Improving internet of things (IoT) security with software-defined networking (SDN)
… These devices are smart and connected to the Internet. Due to this dynamic type of environment,
traditional networks are not the best option to meet the requirements of IoT. There is a …
traditional networks are not the best option to meet the requirements of IoT. There is a …
Internet of Things and its applications: A comprehensive survey
… In this paper, the authors discuss the needs and necessities of adaptive security …
establishing security requirements and applying ample security controls, as long as security …
establishing security requirements and applying ample security controls, as long as security …
Secure Internet of Things (IoT)-based smart-world critical infrastructures: Survey, case study and research opportunities
… Dragoni, “Towards a systematic survey of industrial iot security requirements: research method
and quantitative analysis,” in Proceedings of the Workshop on Fog Computing and the IoT…
and quantitative analysis,” in Proceedings of the Workshop on Fog Computing and the IoT…
Security challenges and opportunities for smart contracts in Internet of Things: A survey
… Cao, and MA Imran, “Blockchain-enabled wireless Internet of Things: Performance analysis
and optimal communication node deployment,” IEEE Internet Things J., vol. 6, no. 3, pp. …
and optimal communication node deployment,” IEEE Internet Things J., vol. 6, no. 3, pp. …
[PDF][PDF] Cyber security and privacy issues in industrial internet of things.
NZ Jhanjhi, M Humayun… - … Systems Science & …, 2021 - cdn.techscience.cn
… internet with the intent of improving productivity and efficiency. These internet-enabled
industries are key targets of Cyber Security (… 3, and each layer has its security requirements that …
industries are key targets of Cyber Security (… 3, and each layer has its security requirements that …
[PDF][PDF] An ontology based approach for context-aware security in the internet of things (IoT)
… An ontology of security requirements for web applications, describing concepts of … The
main aim of this research is to enable the reuse of knowledge about security requirements while …
main aim of this research is to enable the reuse of knowledge about security requirements while …
A survey of internet of things (IoT) authentication schemes
… This paper presents a general overview of the security concerns and requirements in the
IoT environment in a layer-based approach. Then, it provides an up-to-date survey of the …
IoT environment in a layer-based approach. Then, it provides an up-to-date survey of the …