An intelligent agriculture network security system based on private blockchains
Countries around the world are nowadays actively promoting development in intelligent
agriculture. Each of them must develop a specific plan tailored to environmental farming …
agriculture. Each of them must develop a specific plan tailored to environmental farming …
Intelligent security framework for iot devices cryptography based end-to-end security architecture
S Sridhar, S Smys - … on Inventive Systems and Control (ICISC), 2017 - ieeexplore.ieee.org
Internet of Thing (IoT) provide services by linking the different platform devices. They have
the limitation in providing intelligent service. The IoT devices are heterogeneous which …
the limitation in providing intelligent service. The IoT devices are heterogeneous which …
A review of security in internet of things
Abstract Internet of Things (IoT) has drawn significant attention in recent years since it has
made revolutionary changes in human life. The IoT enables the exchange of information in a …
made revolutionary changes in human life. The IoT enables the exchange of information in a …
Decision provenance: Harnessing data flow for accountable systems
Demand is growing for more accountability regarding the technological systems that
increasingly occupy our world. However, the complexity of many of these systems—often …
increasingly occupy our world. However, the complexity of many of these systems—often …
A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications
S Ganapathy - Computer Networks, 2019 - Elsevier
Cloud computing and Internet of Things (IoT) are emerging technologies which have the
capability to enhance the human daily lifestyle. Moreover, the combination of Cloud …
capability to enhance the human daily lifestyle. Moreover, the combination of Cloud …
Data provenance to audit compliance with privacy policy in the Internet of Things
Managing privacy in the IoT presents a significant challenge. We make the case that
information obtained by auditing the flows of data can assist in demonstrating that the …
information obtained by auditing the flows of data can assist in demonstrating that the …
Designing privacy-aware internet of things applications
Abstract Internet of Things (IoT) applications typically collect and analyse personal data that
can be used to derive sensitive information about individuals. However, thus far, privacy …
can be used to derive sensitive information about individuals. However, thus far, privacy …
Secure data collection, storage and access in cloud-assisted IoT
The cloud-assisted Internet of Things (IoT) provides a promising solution to data booming
problems for the ability constraints of individual objects. However, with the leverage of cloud …
problems for the ability constraints of individual objects. However, with the leverage of cloud …
A survey of public-key encryption with search functionality for cloud-assisted IoT
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …
Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models
This paper investigates security concerns and issues for Industrial Internet of Things (IIoT).
The IIoT is an emerging transformation, bringing great values to every industry. Although this …
The IIoT is an emerging transformation, bringing great values to every industry. Although this …