A comprehensive study on cybersecurity challenges and opportunities in the IoT world
It has become possible to link anything and everything to the Internet in recent decades due
to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a …
to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a …
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
In the centralized Wireless Sensor Network (WSN) architecture there exists a central entity,
which acquires, processes and provides information from sensor nodes. Conversely, in the …
which acquires, processes and provides information from sensor nodes. Conversely, in the …
A review of internet of things technologies for ambient assisted living environments
R Maskeliūnas, R Damaševičius, S Segal - Future Internet, 2019 - mdpi.com
The internet of things (IoT) aims to extend the internet to real-world objects, connecting smart
and sensing devices into a global network infrastructure by connecting physical and virtual …
and sensing devices into a global network infrastructure by connecting physical and virtual …
OSCAR: Object security architecture for the Internet of Things
In this paper, we propose OSCAR, an architecture for end-to-end security in the Internet of
Things. It is based on the concept of object security that relates security with the application …
Things. It is based on the concept of object security that relates security with the application …
On perspective of security and privacy-preserving solutions in the internet of things
Abstract The Internet of Things (IoT) brings together a large variety of devices of different
platforms, computational capacities and functionalities. The network heterogeneity and the …
platforms, computational capacities and functionalities. The network heterogeneity and the …
Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0
Industry 4.0 uses a subset of the IoT, called Industrial IoT (IIoT) to achieve connectivity,
interoperability and decentralisation. The deployment of industrial networks rarely considers …
interoperability and decentralisation. The deployment of industrial networks rarely considers …
A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective
HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …
[图书][B] Internet of things: architectures, protocols and standards
This book addresses researchers and graduate students at the forefront of study/research on
the Internet of Things (IoT) by presenting state-of-the-art research together with the current …
the Internet of Things (IoT) by presenting state-of-the-art research together with the current …
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
Wireless sensor Networks (WSNs) deployed in distributed Internet of Things (IoT)
applications should be integrated into the Internet. According to the distributed architecture …
applications should be integrated into the Internet. According to the distributed architecture …
Accelerating fibre orientation estimation from diffusion weighted magnetic resonance imaging using GPUs
With the performance of central processing units (CPUs) having effectively reached a limit,
parallel processing offers an alternative for applications with high computational demands …
parallel processing offers an alternative for applications with high computational demands …