Blockchain integration for IoT-enabled V2X communications: a comprehensive survey, security issues and challenges

PM Rao, S Jangirala, S Pedada, AK Das, Y Park - IEEE Access, 2023 - ieeexplore.ieee.org
In V2X (vehicle-to-everything) communication, there is a two-way communication among the
vehicle (s) and other Internet of Things (IoT)-enabled smart devices around it that may …

Lightweight failover authentication mechanism for IoT-based fog computing environment

S Banerjee, AK Das, S Chattopadhyay, SS Jamal… - Electronics, 2021 - mdpi.com
Fog computing as an extension to the cloud computing infrastructure has been invaluable in
enhancing the applicability of the Internet of Things (IoT) paradigm. IoT based Fog systems …

Consortium blockchain‐enabled access control mechanism in edge computing based generic Internet of Things environment

S Saha, D Chattaraj, B Bera… - Transactions on …, 2021 - Wiley Online Library
This article introduces a new consortium blockchain‐enabled access control scheme in
edge computing based generic Internet of Things environment (called CBACS‐EIoT), where …

UCFL: User categorization using fuzzy logic towards PUF based two-phase authentication of fog assisted IoT devices

AK Das, S Kalam, N Sahar, D Sinha - Computers & Security, 2020 - Elsevier
Abstract Internet of Things (IoT) makes the daily life easier by increasing the connectivity
between the devices. The increase in number of connected devices makes the network …

A review on communication protocols of industrial internet of things

T Anitha, S Manimurugan, S Sridhar… - … on Computing and …, 2022 - ieeexplore.ieee.org
The Industrial IoT (IIoT) system enables the industries to gather and evaluate massive
amounts of data, which can then be utilized, legalized, and improved to provide new sorts of …

Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet‐of‐Things‐Fog environment

U Jain, S Pirasteh, M Hussain - Concurrency and Computation …, 2023 - Wiley Online Library
Security is a major challenge in the design and implementation of Internet‐of‐Things (IoT)‐
Fog networks and it can be resolved by an efficient authentication mechanism. As the …

Cryptographic system for data applications, in the context of internet of things

P Panagiotou, N Sklavos, E Darra… - Microprocessors and …, 2020 - Elsevier
With each passing day, Internet of Things (IoT), has the potential to transform our society to a
more digital way. In this paper, a cryptographic system is proposed, which has been …

Private blockchain envisioned access control system for securing industrial IoT-based pervasive edge computing

S Saha, B Bera, AK Das, N Kumar, SH Islam… - IEEE Access, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is able to connect machines, analytics and people with
IoT smart devices, gateway nodes and edge devices to create powerful intuitivenesses to …

Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey

M Humayun, N Tariq, M Alfayad, M Zakwan… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has revolutionized various domains, enabling interconnected
devices to communicate and exchange data. The integration of Artificial Intelligence (AI) in …

Detecting compromised IOT devices through XGBoost

MAA da Cruz, LR Abbade, P Lorenz… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The evolution and rapid adoption of the Internet of Things (IoT) led to a rise in the number of
attacks that target IoT environments. IoT environments are vulnerable to several attacks …