Blockchain integration for IoT-enabled V2X communications: a comprehensive survey, security issues and challenges
In V2X (vehicle-to-everything) communication, there is a two-way communication among the
vehicle (s) and other Internet of Things (IoT)-enabled smart devices around it that may …
vehicle (s) and other Internet of Things (IoT)-enabled smart devices around it that may …
Lightweight failover authentication mechanism for IoT-based fog computing environment
Fog computing as an extension to the cloud computing infrastructure has been invaluable in
enhancing the applicability of the Internet of Things (IoT) paradigm. IoT based Fog systems …
enhancing the applicability of the Internet of Things (IoT) paradigm. IoT based Fog systems …
Consortium blockchain‐enabled access control mechanism in edge computing based generic Internet of Things environment
This article introduces a new consortium blockchain‐enabled access control scheme in
edge computing based generic Internet of Things environment (called CBACS‐EIoT), where …
edge computing based generic Internet of Things environment (called CBACS‐EIoT), where …
UCFL: User categorization using fuzzy logic towards PUF based two-phase authentication of fog assisted IoT devices
Abstract Internet of Things (IoT) makes the daily life easier by increasing the connectivity
between the devices. The increase in number of connected devices makes the network …
between the devices. The increase in number of connected devices makes the network …
A review on communication protocols of industrial internet of things
The Industrial IoT (IIoT) system enables the industries to gather and evaluate massive
amounts of data, which can then be utilized, legalized, and improved to provide new sorts of …
amounts of data, which can then be utilized, legalized, and improved to provide new sorts of …
Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet‐of‐Things‐Fog environment
Security is a major challenge in the design and implementation of Internet‐of‐Things (IoT)‐
Fog networks and it can be resolved by an efficient authentication mechanism. As the …
Fog networks and it can be resolved by an efficient authentication mechanism. As the …
Cryptographic system for data applications, in the context of internet of things
P Panagiotou, N Sklavos, E Darra… - Microprocessors and …, 2020 - Elsevier
With each passing day, Internet of Things (IoT), has the potential to transform our society to a
more digital way. In this paper, a cryptographic system is proposed, which has been …
more digital way. In this paper, a cryptographic system is proposed, which has been …
Private blockchain envisioned access control system for securing industrial IoT-based pervasive edge computing
The Industrial Internet of Things (IIoT) is able to connect machines, analytics and people with
IoT smart devices, gateway nodes and edge devices to create powerful intuitivenesses to …
IoT smart devices, gateway nodes and edge devices to create powerful intuitivenesses to …
Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey
The Internet of Things (IoT) has revolutionized various domains, enabling interconnected
devices to communicate and exchange data. The integration of Artificial Intelligence (AI) in …
devices to communicate and exchange data. The integration of Artificial Intelligence (AI) in …
Detecting compromised IOT devices through XGBoost
The evolution and rapid adoption of the Internet of Things (IoT) led to a rise in the number of
attacks that target IoT environments. IoT environments are vulnerable to several attacks …
attacks that target IoT environments. IoT environments are vulnerable to several attacks …