Lightweight searchable encryption protocol for industrial internet of things

K Zhang, J Long, X Wang, HN Dai… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
ensuring data security. Although the lightweight IoT schemes can preserve privacy and
security … various sensors and smart meters can monitor the real-time status of microgrids [23]. In …

Edge-based auditing method for data security in resource-constrained internet of things

T Wang, Y Mei, X Liu, J Wang, HN Dai… - Journal of Systems …, 2021 - Elsevier
Internet of Things (IoT) data calls for cloud service providers (CSP) to further provide more
secure … third-party audit (TPA) to check data security in the cloud. TPA solves the problem of …

[HTML][HTML] Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model

S Shukla, S Thakur, S Hussain, JG Breslin, SM Jameel - Internet of Things, 2021 - Elsevier
Internet-of-Things (IoT) offers many benefits including data transmission in real-time mode,
… The aim is to extend secure data transmission for healthcare IoT and end-users availing the …

Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research

S Aldhaheri, D Alghazzawi, L Cheng, A Barnawi… - Journal of Network and …, 2020 - Elsevier
… their way to local or remote servers Two operational traffic: First is local traffic which used
for real-time (or near real-time); Second traffic is controlling the areas of the overall system. …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
… , solutions, and their security implications. In order to systematically analyze the security of
E-… In addition, we present key observations in state-of-the-art E-IoT security and provide a list …

Decision-making model for securing IoT devices in smart industries

G Rathee, S Garg, G Kaddoum… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… powerful Internet of Things (IoT) application that enables industrial growth by ensuring
communication and transfer of information through legitimate devices in real-time scenarios. …

Intelligent and secure edge-enabled computing model for sustainable cities using green internet of things

K Haseeb, IU Din, A Almogren, I Ahmed… - Sustainable Cities and …, 2021 - Elsevier
… This paper presents an intelligent and secure edge-enabled computing (ISEC) model for …
aims to facilitate real-time communications for sustainable cities. Moreover, it secures real-time

Securing internet of medical things with friendly-jamming schemes

X Li, HN Dai, Q Wang, M Imran, D Li… - Computer Communications, 2020 - Elsevier
… computing, machine learning/deep learning and Internet of Things, more powerful and
convenient … IoMT can be used to provide remote real-time health monitoring, studying the effect of …

Security framework for internet-of-things-based software-defined networks using blockchain

S Rani, H Babbar, G Srivastava… - … Internet of Things …, 2022 - ieeexplore.ieee.org
… The Internet of Things (IoT) is making numerous advancements to improve our digital …
enable realtime access to data generated by IoT devices. Tselios et al. depict security challenges …

Iovt: Internet of vulnerable things? threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart grids

P Anand, Y Singh, A Selwal, PK Singh, RA Felseghi… - Energies, 2020 - mdpi.com
Internet of Things (IoT)-based attacks with the exponential increase in the number of IoT
devices. Alongside this, the means to secure … architecture could detect real-time attacks in an IoT …