Blockchain technology for data privacy using contract mechanism for 5G networks
With ever-evolving internet models automating and digitizing innumerable industrial and
domestic applications, today's world has achieved tremendous gains in the exchange of …
domestic applications, today's world has achieved tremendous gains in the exchange of …
Lightweight cryptographic protocols for IoT-constrained devices: A survey
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …
[HTML][HTML] Efficient intelligent intrusion detection system for heterogeneous internet of things (HetIoT)
Moving towards a more digital and intelligent world equipped with internet-of-thing (IoT)
devices creates many security issues. A distributed denial of service (DDoS) attack is one of …
devices creates many security issues. A distributed denial of service (DDoS) attack is one of …
[HTML][HTML] Static analysis for discovering IoT vulnerabilities
Abstract The Open Web Application Security Project (OWASP), released the “OWASP Top
10 Internet of Things 2018” list of the high-priority security vulnerabilities for IoT systems. The …
10 Internet of Things 2018” list of the high-priority security vulnerabilities for IoT systems. The …
Trustworthy IoT data streaming using blockchain and IPFS
Today's resource-constrained IoT streaming devices generate large amounts of data which
is stored, processed, analyzed for value creation, and accessed using centralized systems …
is stored, processed, analyzed for value creation, and accessed using centralized systems …
[HTML][HTML] Blockchain technology for secured healthcare data communication among the non-terminal nodes in IoT architecture in 5G network
In the contemporary world, with ever-evolving internet models in the process of automating
and digitalizing various industrial and domestic implementations, the Internet of Things (IoT) …
and digitalizing various industrial and domestic implementations, the Internet of Things (IoT) …
A survey of secure internet of things in relation to blockchain
Distributed ledgers and blockchain technologies can improve system security and
trustworthiness by providing immutable replicated histories of data. Blockchain is a linked list …
trustworthiness by providing immutable replicated histories of data. Blockchain is a linked list …
Internet of medical things-based secure and energy-efficient framework for health care
The Internet of Medical Things (IoMT) is a collection of medical equipment and software that
can help patients get better care. The purpose of this study is to improve the security of data …
can help patients get better care. The purpose of this study is to improve the security of data …
Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment
OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central
processing of the vast amount of IoT data. Although fog computing has the advantages of …
processing of the vast amount of IoT data. Although fog computing has the advantages of …
Internet of Things data management: A systematic literature review, vision, and future trends
N Shirvanian, M Shams… - International Journal of …, 2022 - Wiley Online Library
Summary The Internet of Things (IoT) is expected to connect devices with unique identifiers
over a network to create an equilibrium system with high speeds and volumes of data while …
over a network to create an equilibrium system with high speeds and volumes of data while …