An intelligent agriculture network security system based on private blockchains

HT Wu, CW Tsai - Journal of Communications and Networks, 2019 - ieeexplore.ieee.org
Countries around the world are nowadays actively promoting development in intelligent
agriculture. Each of them must develop a specific plan tailored to environmental farming …

Intelligent security framework for iot devices cryptography based end-to-end security architecture

S Sridhar, S Smys - … on Inventive Systems and Control (ICISC), 2017 - ieeexplore.ieee.org
Internet of Thing (IoT) provide services by linking the different platform devices. They have
the limitation in providing intelligent service. The IoT devices are heterogeneous which …

A review of security in internet of things

Y Harbi, Z Aliouat, S Harous, A Bentaleb… - Wireless Personal …, 2019 - Springer
Abstract Internet of Things (IoT) has drawn significant attention in recent years since it has
made revolutionary changes in human life. The IoT enables the exchange of information in a …

Decision provenance: Harnessing data flow for accountable systems

J Singh, J Cobbe, C Norval - IEEE Access, 2018 - ieeexplore.ieee.org
Demand is growing for more accountability regarding the technological systems that
increasingly occupy our world. However, the complexity of many of these systems—often …

A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications

S Ganapathy - Computer Networks, 2019 - Elsevier
Cloud computing and Internet of Things (IoT) are emerging technologies which have the
capability to enhance the human daily lifestyle. Moreover, the combination of Cloud …

Data provenance to audit compliance with privacy policy in the Internet of Things

T Pasquier, J Singh, J Powles, D Eyers… - Personal and Ubiquitous …, 2018 - Springer
Managing privacy in the IoT presents a significant challenge. We make the case that
information obtained by auditing the flows of data can assist in demonstrating that the …

Designing privacy-aware internet of things applications

C Perera, M Barhamgi, AK Bandara, M Ajmal… - Information …, 2020 - Elsevier
Abstract Internet of Things (IoT) applications typically collect and analyse personal data that
can be used to derive sensitive information about individuals. However, thus far, privacy …

Secure data collection, storage and access in cloud-assisted IoT

W Wang, P Xu, LT Yang - IEEE cloud computing, 2018 - ieeexplore.ieee.org
The cloud-assisted Internet of Things (IoT) provides a promising solution to data booming
problems for the ability constraints of individual objects. However, with the leverage of cloud …

A survey of public-key encryption with search functionality for cloud-assisted IoT

H Xiong, T Yao, H Wang, J Feng… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …

Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models

Z Bakhshi, A Balador, J Mustafa - 2018 IEEE wireless …, 2018 - ieeexplore.ieee.org
This paper investigates security concerns and issues for Industrial Internet of Things (IIoT).
The IIoT is an emerging transformation, bringing great values to every industry. Although this …