Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions

MA Jan, J Cai, XC Gao, F Khan, S Mastorakis… - Journal of Network and …, 2021 - Elsevier
Abstract The Internet of Multimedia Things (IoMT) orchestration enables the integration of
systems, software, cloud, and smart sensors into a single platform. The IoMT deals with …

Internet of Things security and forensics: Challenges and opportunities

M Conti, A Dehghantanha, K Franke… - Future Generation …, 2018 - Elsevier
Abstract The Internet of Things (IoT) envisions pervasive, connected, and smart nodes
interacting autonomously while offering all sorts of services. Wide distribution, openness and …

Current research trends in IoT security: a systematic mapping study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

[HTML][HTML] PKI4IoT: Towards public key infrastructure for the Internet of Things

J Höglund, S Lindemer, M Furuhed, S Raza - Computers & Security, 2020 - Elsevier
Abstract Public Key Infrastructure is the state-of-the-art credential management solution on
the Internet. However, the millions of constrained devices that make of the Internet of Things …

ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things

S Majumder, S Ray, D Sadhukhan, MK Khan… - Wireless Personal …, 2021 - Springer
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …

Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography

S Atiewi, A Al-Rahayfeh, M Almiani, S Yussof… - IEEE …, 2020 - ieeexplore.ieee.org
Organizations share an evolving interest in adopting a cloud computing approach for
Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology …

[HTML][HTML] Improving efficiency and security of IIoT communications using in-network validation of server certificate

A Atutxa, J Astorga, M Barcelo, A Urbieta, E Jacob - Computers in Industry, 2023 - Elsevier
The use of advanced communications and smart mechanisms in industry is growing rapidly,
making cybersecurity a critical aspect. Currently, most industrial communication protocols …

Application-aware end-to-end delay and message loss estimation in Internet of Things (IoT)—MQTT-SN protocols

DG Roy, B Mahato, D De, R Buyya - Future Generation Computer Systems, 2018 - Elsevier
Abstract Wireless Sensor Network (WSN) is suffering from ailments like a small lifetime of
participating nodes, packet loss during delivery, an end-to-end delay etc. Static allocation of …

Understanding security in smart city domains from the ANT-centric perspective

J Fan, W Yang, Z Liu, J Kang, D Niyato… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
A city is a large human settlement that serves the people who live there, and a smart city is a
concept of how cities might better serve their residents through new forms of technology. In …

Application layer key establishment for end-to-end security in IoT

S Pérez, JL Hernández-Ramos, S Raza… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In most Internet of Things (IoT) deployments, intermediate entities are usually employed for
efficiency and scalability reasons. These intermediate proxies break end-to-end security …