FLEAM: A federated learning empowered architecture to mitigate DDoS in industrial IoT

J Li, L Lyu, X Liu, X Zhang, X Lyu - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Due to resource constraints and working surroundings, many IIoT nodes are easily hacked
and turn into zombies from which to launch attacks. It is challenging to detect such …

Effect of internet of things on manufacturing performance: A hybrid multi-criteria decision-making and neuro-fuzzy approach

S Asadi, M Nilashi, M Iranmanesh, SS Hyun, A Rezvani - Technovation, 2022 - Elsevier
We have entered a new technological paradigm with the emergence of Internet-embedded
software and hardware, so-called the Internet of Things (IoT). Although IoT offers pan …

Internet of things in the healthcare applications: overview of security and privacy issues

SB Othman, FA Almalki, H Sakli - Intelligent Healthcare: Infrastructure …, 2022 - Springer
Current advances in technology have led to the emergence of networks of small and low-
cost devices that incorporate sensors with embedded processing and limited wireless …

A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross‐Domain IoT

Y Zhang, Y Luo, X Chen, F Tong, Y Xu… - Security and …, 2022 - Wiley Online Library
Internet of Things (IoT) has been ubiquitous in both industrial and living areas, but also
known for its weak security. Being as the first defense line against various cyberattacks …

A PLS-HECC-based device authentication and key agreement scheme for smart home networks

J Pirayesh, A Giaretta, M Conti, P Keshavarzi - Computer Networks, 2022 - Elsevier
IoT devices permeate our society, collect personal data, and support critical infrastructures
such as the healthcare. Therefore, there is a critical need for authentication and …

Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review

E Ebrahimpour, S Babaie - International Journal of Information Security, 2024 - Springer
Abstract Internet of Things (IoT) as an emerging technology is based on the idea that smart
things can connect to the Internet and exchange the collected data in a peer-to-peer …

Factors influencing patient adoption of the IoT for E-health management systems (e-HMS) using the UTAUT model: a high order SEM-ANN approach

M Dadhich, KK Hiran, SS Rao… - International Journal of …, 2022 - igi-global.com
This study examines factors influencing patients' adoption of the IoT for e-Health
Management System (e-HMS). A conceptual framework is built by applying the Unified …

[HTML][HTML] A framework for application-centric Internet of Things authentication

N Shingari, B Mago - Results in Engineering, 2024 - Elsevier
Abstract The Internet of Things (IoT) has various security needs due to its diversified data
management and application support. IoT processing platforms provide security guidelines …

A secure and efficient renewable energy sharing framework for distributed prosumers

Q An, C Dong, J Li, F Jiang - 2023 IEEE IAS Global Conference …, 2023 - ieeexplore.ieee.org
A microgrid incorporates renewable energy sources, generating and storing power in a
distributed manner. Traditionally, a microgrid can only sell the surplus of energy to the grid at …

E-CIS: Edge-based classifier identification scheme in green & sustainable IoT smart city

Y Sun, J Liu, AK Bashir, U Tariq, W Liu, K Chen… - Sustainable Cities and …, 2021 - Elsevier
Smart city has brought the unprecedented development and application of Internet of things
(IoT) devices. Meanwhile, since both of the quantity and the type of IoT devices are growing …