Blockchain technology for data privacy using contract mechanism for 5G networks

P William, N Yogeesh, S Vimala… - 2022 3rd international …, 2022 - ieeexplore.ieee.org
With ever-evolving internet models automating and digitizing innumerable industrial and
domestic applications, today's world has achieved tremendous gains in the exchange of …

Lightweight cryptographic protocols for IoT-constrained devices: A survey

MN Khan, A Rao, S Camtepe - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …

[HTML][HTML] Efficient intelligent intrusion detection system for heterogeneous internet of things (HetIoT)

S Mahadik, PM Pawar, R Muthalagu - Journal of Network and Systems …, 2023 - Springer
Moving towards a more digital and intelligent world equipped with internet-of-thing (IoT)
devices creates many security issues. A distributed denial of service (DDoS) attack is one of …

[HTML][HTML] Static analysis for discovering IoT vulnerabilities

P Ferrara, AK Mandal, A Cortesi, F Spoto - International Journal on …, 2021 - Springer
Abstract The Open Web Application Security Project (OWASP), released the “OWASP Top
10 Internet of Things 2018” list of the high-priority security vulnerabilities for IoT systems. The …

Trustworthy IoT data streaming using blockchain and IPFS

HR Hasan, K Salah, I Yaqoob, R Jayaraman… - IEEE …, 2022 - ieeexplore.ieee.org
Today's resource-constrained IoT streaming devices generate large amounts of data which
is stored, processed, analyzed for value creation, and accessed using centralized systems …

[HTML][HTML] Blockchain technology for secured healthcare data communication among the non-terminal nodes in IoT architecture in 5G network

PN Srinivasu, AK Bhoi, SR Nayak, MR Bhutta… - Electronics, 2021 - mdpi.com
In the contemporary world, with ever-evolving internet models in the process of automating
and digitalizing various industrial and domestic implementations, the Internet of Things (IoT) …

A survey of secure internet of things in relation to blockchain

M Alizadeh, K Andersson, O Schelen - Journal of Internet Services …, 2020 - diva-portal.org
Distributed ledgers and blockchain technologies can improve system security and
trustworthiness by providing immutable replicated histories of data. Blockchain is a linked list …

Internet of medical things-based secure and energy-efficient framework for health care

A Rana, C Chakraborty, S Sharma, S Dhawan, SK Pani… - Big Data, 2022 - liebertpub.com
The Internet of Medical Things (IoMT) is a collection of medical equipment and software that
can help patients get better care. The purpose of this study is to improve the security of data …

Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment

OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central
processing of the vast amount of IoT data. Although fog computing has the advantages of …

Internet of Things data management: A systematic literature review, vision, and future trends

N Shirvanian, M Shams… - International Journal of …, 2022 - Wiley Online Library
Summary The Internet of Things (IoT) is expected to connect devices with unique identifiers
over a network to create an equilibrium system with high speeds and volumes of data while …