A comprehensive study on cybersecurity challenges and opportunities in the IoT world

AN Lone, S Mustajab, M Alam - Security and Privacy, 2023 - Wiley Online Library
It has become possible to link anything and everything to the Internet in recent decades due
to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a …

Two-phase authentication protocol for wireless sensor networks in distributed IoT applications

P Porambage, C Schmitt, P Kumar… - 2014 IEEE Wireless …, 2014 - ieeexplore.ieee.org
In the centralized Wireless Sensor Network (WSN) architecture there exists a central entity,
which acquires, processes and provides information from sensor nodes. Conversely, in the …

A review of internet of things technologies for ambient assisted living environments

R Maskeliūnas, R Damaševičius, S Segal - Future Internet, 2019 - mdpi.com
The internet of things (IoT) aims to extend the internet to real-world objects, connecting smart
and sensing devices into a global network infrastructure by connecting physical and virtual …

OSCAR: Object security architecture for the Internet of Things

M Vučinić, B Tourancheau, F Rousseau, A Duda… - Ad Hoc Networks, 2015 - Elsevier
In this paper, we propose OSCAR, an architecture for end-to-end security in the Internet of
Things. It is based on the concept of object security that relates security with the application …

On perspective of security and privacy-preserving solutions in the internet of things

L Malina, J Hajny, R Fujdiak, J Hosek - Computer Networks, 2016 - Elsevier
Abstract The Internet of Things (IoT) brings together a large variety of devices of different
platforms, computational capacities and functionalities. The network heterogeneity and the …

Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0

A Mosteiro-Sanchez, M Barcelo, J Astorga… - Journal of Manufacturing …, 2020 - Elsevier
Industry 4.0 uses a subset of the IoT, called Industrial IoT (IIoT) to achieve connectivity,
interoperability and decentralisation. The deployment of industrial networks rarely considers …

A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective

HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …

[图书][B] Internet of things: architectures, protocols and standards

S Cirani, G Ferrari, M Picone, L Veltri - 2018 - books.google.com
This book addresses researchers and graduate students at the forefront of study/research on
the Internet of Things (IoT) by presenting state-of-the-art research together with the current …

PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications

P Porambage, C Schmitt, P Kumar… - International …, 2014 - journals.sagepub.com
Wireless sensor Networks (WSNs) deployed in distributed Internet of Things (IoT)
applications should be integrated into the Internet. According to the distributed architecture …

Accelerating fibre orientation estimation from diffusion weighted magnetic resonance imaging using GPUs

M Hernández, GD Guerrero, JM Cecilia, JM García… - PloS one, 2013 - journals.plos.org
With the performance of central processing units (CPUs) having effectively reached a limit,
parallel processing offers an alternative for applications with high computational demands …