Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions
Abstract The Internet of Multimedia Things (IoMT) orchestration enables the integration of
systems, software, cloud, and smart sensors into a single platform. The IoMT deals with …
systems, software, cloud, and smart sensors into a single platform. The IoMT deals with …
Internet of Things security and forensics: Challenges and opportunities
Abstract The Internet of Things (IoT) envisions pervasive, connected, and smart nodes
interacting autonomously while offering all sorts of services. Wide distribution, openness and …
interacting autonomously while offering all sorts of services. Wide distribution, openness and …
Current research trends in IoT security: a systematic mapping study
JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …
[HTML][HTML] PKI4IoT: Towards public key infrastructure for the Internet of Things
J Höglund, S Lindemer, M Furuhed, S Raza - Computers & Security, 2020 - Elsevier
Abstract Public Key Infrastructure is the state-of-the-art credential management solution on
the Internet. However, the millions of constrained devices that make of the Internet of Things …
the Internet. However, the millions of constrained devices that make of the Internet of Things …
ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …
compressed version of HTTP protocol that is used for communication between lightweight …
Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography
Organizations share an evolving interest in adopting a cloud computing approach for
Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology …
Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology …
[HTML][HTML] Improving efficiency and security of IIoT communications using in-network validation of server certificate
The use of advanced communications and smart mechanisms in industry is growing rapidly,
making cybersecurity a critical aspect. Currently, most industrial communication protocols …
making cybersecurity a critical aspect. Currently, most industrial communication protocols …
Application-aware end-to-end delay and message loss estimation in Internet of Things (IoT)—MQTT-SN protocols
Abstract Wireless Sensor Network (WSN) is suffering from ailments like a small lifetime of
participating nodes, packet loss during delivery, an end-to-end delay etc. Static allocation of …
participating nodes, packet loss during delivery, an end-to-end delay etc. Static allocation of …
Understanding security in smart city domains from the ANT-centric perspective
A city is a large human settlement that serves the people who live there, and a smart city is a
concept of how cities might better serve their residents through new forms of technology. In …
concept of how cities might better serve their residents through new forms of technology. In …
Application layer key establishment for end-to-end security in IoT
In most Internet of Things (IoT) deployments, intermediate entities are usually employed for
efficiency and scalability reasons. These intermediate proxies break end-to-end security …
efficiency and scalability reasons. These intermediate proxies break end-to-end security …