RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning

B Chatterjee, D Das, S Maity… - IEEE internet of things …, 2018 - ieeexplore.ieee.org
security features. The remainder of the paper is organized as follows: Section II lists the most
recent developments in the area … The steady-state analysis method is relatively unexplored, …

Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions

A Akhunzada, M Sookhak, NB Anuar, A Gani… - Journal of Network and …, 2015 - Elsevier
… of Things – where traditional computer and network security are … to Schneier a high degree
of security is in our hands. He … Table 4 shows the unexplored areas of SP primitives from …

Cyber security threats and challenges in collaborative mixed-reality

J Happa, M Glencross, A Steed - Frontiers in ICT, 2019 - frontiersin.org
… This has focused on the Internet of Things (IoT), online games … areas relevant to CMR
applications. Then we present the … the (as yet) largely unexplored socio-technical aspects of harms …

[PDF][PDF] Unpacking security policy compliance: The motivators and barriers of employees' security behaviors

JM Blythe, L Coventry, L Little - … On Usable Privacy and Security  …, 2015 - usenix.org
… occurrence and a very serious thing so security was.. it was like … quantitative studies has
remained relatively unexplored. … contributions to the security research area and organizational …

Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things

B Guo, D Zhang, Z Wang, Z Yu, X Zhou - Journal of Network and Computer …, 2013 - Elsevier
things in common with the aforementioned research areas, yet it goes beyond all those areas
… Mechanisms for establishing trust are thus crucial to maintain information security and data …

Access control in Internet-of-Things: A survey

S Ravidas, A Lekidis, F Paci, N Zannone - Journal of Network and …, 2019 - Elsevier
… A recent technological evolution in the area of pervasive computing is the Internet of Things
(… several security and privacy issues. In this work, we focus on one of the main security issues …

Cybersecurity issues in wireless sensor networks: current challenges and solutions

DE Boubiche, S Athmani, S Boubiche… - Wireless Personal …, 2021 - Springer
… them based the addressed security issue. Also, we outline the main security constraints and
… The WSNs are most often deployed randomly in hostile and unexplored areas, and must self…

Green internet of things for smart world

C Zhu, VCM Leung, L Shu, ECH Ngai - IEEE access, 2015 - ieeexplore.ieee.org
… is consisted of various ‘‘things’’. As one of the enablers of smart world, internet of things (IoT)
[2]–[7… , Internet of Things, network security and privacy, smart city, and e-health applications. …

Navigating the Uncharted Waters: Exploring Challenges and Opportunities in Block chain-Enabled Cloud Computing for Future Research

A Kumar, M Fahad, H Arif… - … Jurnal Multidisiplin Ilmu, 2023 - journal.mediapublikasi.id
… a major area of innovation. This section delves into the intricate realm of security implications,
… Upon the completion of our investigation into the unexplored domain where block chain …

Context aware computing for the internet of things: A survey

C Perera, A Zaslavsky, P Christen… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
… on existing popular Internet of Things middleware solutions in 2011… We believe this approach
allows us to highlight the areas … (SN) and the IoT is largely unexplored and blurred. We can …