Secrecy loss in diffusive molecular timing channels

G Sharma, A Singh - … on Molecular, Biological and Multi-Scale …, 2022 - ieeexplore.ieee.org
This paper uses a secrecy performance metric to analyze and evaluate the secrecy
performance of multi-particle diffusive molecular timing (DMT) channels. Using the existing …

Open sensor manager for IIoT

R Ala-Laurinaho, J Autiosalo, K Tammi - Journal of Sensor and Actuator …, 2020 - mdpi.com
Data collection in an industrial environment enables several benefits: processes and
machinery can be monitored; the performance can be optimized; and the machinery can be …

A Comprehensive Study of Cybersecurity Threats and Countermeasures: Strategies for Mitigating Risks in the Digital Age.

A Sleem - Journal of Cybersecurity & Information …, 2022 - search.ebscohost.com
The digital age has ushered in a new era of connectivity and opportunity. However, it has
also made us more vulnerable to cyber threats. In recent years, we have seen a rise in the …

The role of soc in ensuring the security of iot devices: A review of current challenges and future directions

H Bennouri, A Abdi, I Hossain… - 2023 12th Mediterranean …, 2023 - ieeexplore.ieee.org
The growing popularity and deployment of Internet of Things (IoT) devices has led to serious
security concerns. The integration of a security operations center (SOC) becomes …

Securing IoT networks in cloud computing environments: a real-time IDS

S Biswas, MSA Ansari - The Journal of Supercomputing, 2024 - Springer
Abstract The term “Internet of Things”(IoT) encompasses an entire group of gadgets that are
capable of connecting to the Internet in order to gather and share data. The IoT paradigm is …

Internet of things security requirements, threats, attacks, and countermeasures

M Abdel-Basset, N Moustafa, H Hawash… - … learning techniques for …, 2022 - Springer
This chapter elaborates on different security aspects to be taken into accounts during the
development and the deployments of IoT architecture. To make the reader about the security …

Delegated Anonymous Credentials With Revocation Capability for IoT Service Chains (DANCIS)

SK Pinjala, SS Vivek… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
This article deals with providing privacy-preserving access control in Internet of Things (IoT)
systems. Here, a user/IoT device requests access to services provided by other IoT devices …

The role of metrology in the cyber-security of embedded devices

P Arpaia, F Caputo, A Cioffi, A Esposito - Acta IMEKO, 2023 - acta.imeko.org
The cyber-security of an embedded device is a crucial issue especially in the Internet of
Things (IoT) paradigm, since the physical accessibility to the smart transducers eases an …

Security and privacy in iomt-based digital health care: A survey

A Singh, R Sinha, Komal, A Satpathy… - Robotics, Control and …, 2023 - Springer
The integration of medical devices with the Internet of Things (IoT) is known as the Internet of
Medical Things (IoMT). The IoMT devices collect medical data containing information about …

Towards transparent and secure IoT: Improving the security and privacy through a user-centric rules-based system

J Lola, C Serrão, J Casal - Electronics, 2023 - mdpi.com
In recent years, we have seen a growing wave in the integration of IoT (Internet of Things)
technologies into society. This has created new opportunities, but at the same time given …