[HTML][HTML] Setting privacy “by default” in social IoT: Theorizing the challenges and directions in Big Data Research

JR Saura, D Ribeiro-Soriano, D Palacios-Marqués - Big Data Research, 2021 - Elsevier
Abstract The social Internet of Things (SIoT) shares large amounts of data that are then
processed by other Internet of Thing (IoT) devices, which results in the generation …

A blockchain-facilitated secure sensing data processing and logging system

W Zhao, IM Aldyaflah, P Gangwani, S Joshi… - IEEE …, 2023 - ieeexplore.ieee.org
In this paper, we present the design, implementation, and evaluation of a secure sensing
data processing and logging system. The system is inspired and enabled by the blockchain …

A systematic review of bio-cyber interface technologies and security issues for internet of bio-nano things

S Zafar, M Nazir, T Bakhshi, HA Khattak, S Khan… - IEEE …, 2021 - ieeexplore.ieee.org
Advances in synthetic biology and nanotechnology have contributed to the design of tools
that can be used to control, reuse, modify, and re-engineer cells' structure, as well as …

PbDinEHR: A novel privacy by design developed framework using distributed data storage and sharing for secure and scalable electronic health records management

FH Semantha, S Azam, B Shanmugam… - Journal of Sensor and …, 2023 - mdpi.com
Privacy in Electronic Health Records (EHR) has become a significant concern in today's
rapidly changing world, particularly for personal and sensitive user data. The sheer volume …

A comprehensive survey on secure software‐defined network for the Internet of Things

M Babiker Mohamed, O Matthew Alofe… - Transactions on …, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) is the network of smart devices, sensors, and machines
that continuously monitored the surrounding environment and execute meaningful decisions …

Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks

A Verma, V Ranga - Transactions on emerging …, 2020 - Wiley Online Library
Abstract The IPv6 Routing Protocol for Low‐Power and Lossy Networks (RPL) is the de facto
routing protocol for IPv6‐based Low‐Power Wireless Personal Area Networks (6LoWPAN) …

Securing the Internet of Things (IoT): A comprehensive study on the intersection of cybersecurity, privacy, and connectivity in the IoT ecosystem

S Ahmed, M Khan - AI, IoT and the Fourth Industrial Revolution …, 2023 - scicadence.com
Abstract The Internet of Things (IoT) landscape has expanded substantially, impacting
sectors ranging from healthcare to manufacturing, and becoming an integral part of modern …

Artificial intelligence techniques for cognitive sensing in future IoT: State-of-the-Art, potentials, and challenges

MO Osifeko, GP Hancke, AM Abu-Mahfouz - Journal of Sensor and …, 2020 - mdpi.com
Smart, secure and energy-efficient data collection (DC) processes are key to the realization
of the full potentials of future Internet of Things (FIoT)-based systems. Currently, challenges …

A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities

B Alotaibi - Sensors, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …

A study on security and privacy guidelines, countermeasures, threats: IoT data at rest perspective

HA Abdulghani, NA Nijdam, A Collen, D Konstantas - Symmetry, 2019 - mdpi.com
The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful
due to the development of many applications around us including smart cities, smart cars …