A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT
J Sengupta, S Ruj, SD Bit - Journal of network and computer applications, 2020 - Elsevier
In recent years, the growing popularity of Internet of Things (IoT) is providing a promising
opportunity not only for the development of various home automation systems but also for …
opportunity not only for the development of various home automation systems but also for …
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …
controlling and monitoring of the connected smart objects. IoT applications range over a …
SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT
S Sujanthi, S Nithya Kalyani - Wireless Personal Communications, 2020 - Springer
In WSN-assisted IoT, energy efficiency and security which play pivotal role in Quality of
Service (QoS) are still challenging due to its open and resource constrained nature …
Service (QoS) are still challenging due to its open and resource constrained nature …
An efficient public key secure scheme for cloud and IoT security
Abstract According to the National Institute of Standard and Technology (NIST), the security
level of RSA is safe when it is N-bit modulus≥ 2048 bits. Because of this, the processing …
level of RSA is safe when it is N-bit modulus≥ 2048 bits. Because of this, the processing …
Modelling DDoS attacks in IoT networks using machine learning
Abstract The Internet-of-Things (IoT) relies on the TCP protocol to transport data from a
source to a destination. Making it vulnerable to DDoS using the TCP SYN attack on Cyber …
source to a destination. Making it vulnerable to DDoS using the TCP SYN attack on Cyber …
Towards a secure and scalable iot infrastructure: A pilot deployment for a smart water monitoring system
A Overmars, S Venkatraman - Technologies, 2020 - mdpi.com
Recent growth in the Internet of Things (IoT) looks promising for realizing a smart
environment of the future. However, concerns about the security of IoT devices are …
environment of the future. However, concerns about the security of IoT devices are …
Research on security detection technology for internet of things terminal based on firmware code genes
X Zhu, Q Li, Z Chen, G Zhang, P Shan - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) terminals have firmware with heterogeneous, closed-source, and
heavy business but light security characteristics, whereas on the edge, there are limited …
heavy business but light security characteristics, whereas on the edge, there are limited …
Blockchain-integrated internet-of-Things architecture in privacy preserving for large-scale healthcare supply chain data
K Pal - … Technology and Computational Excellence for Society …, 2022 - igi-global.com
The supply chain forms the backbone of healthcare industry operations. The design and
development of healthcare information systems (HIS) help different types of decision-making …
development of healthcare information systems (HIS) help different types of decision-making …
FaTEMa: A framework for multi-layer fault tolerance in IoT systems
M Melo, G Aquino - Sensors, 2021 - mdpi.com
Fault tolerance in IoT systems is challenging to overcome due to its complexity, dynamicity,
and heterogeneity. IoT systems are typically designed and constructed in layers. Every layer …
and heterogeneity. IoT systems are typically designed and constructed in layers. Every layer …