Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives
MR Alagheband, A Mashatan - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) systems in different areas, such as manufacturing,
transportation, and healthcare, are the convergence of several technologies. There are …
transportation, and healthcare, are the convergence of several technologies. There are …
Ranking security of IoT-based smart home consumer devices
NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …
based assistants, smart lighting, and security cameras have widely adopted the Internet of …
A blockchain-based security and trust mechanism for AI-enabled IIoT systems
The complexity and heterogeneity of artificial intelligence (AI) enabled industrial Internet of
things (IIoT) lead to lacks of mutual trust between devices and directly affects the data …
things (IIoT) lead to lacks of mutual trust between devices and directly affects the data …
[PDF][PDF] Distributed Timestamp Mechanism Based on Verifiable Delay Functions.
Q Wu, Z Han, G Mohiuddin, Y Ren - Computer Systems Science …, 2023 - cdn.techscience.cn
In the data communication system, the real-time information interaction of communication
device increases the risk of privacy sensitive data being tampered with. Therefore …
device increases the risk of privacy sensitive data being tampered with. Therefore …
Data-agnostic model poisoning against federated learning: A graph autoencoder approach
This paper proposes a novel, data-agnostic, model poisoning attack on Federated Learning
(FL), by designing a new adversarial graph autoencoder (GAE)-based framework. The …
(FL), by designing a new adversarial graph autoencoder (GAE)-based framework. The …
[HTML][HTML] Nested Bee Hive: A conceptual multilayer architecture for 6G in futuristic sustainable smart cities
Several smart city ideas are introduced to manage various problems caused by
overpopulation, but the futuristic smart city is a concept based on dense and artificial …
overpopulation, but the futuristic smart city is a concept based on dense and artificial …
SECS/GEMsec: A mechanism for detection and prevention of cyber-attacks on SECS/GEM communications in industry 4.0 landscape
SUA Laghari, S Manickam, AK Al-Ani… - Ieee …, 2021 - ieeexplore.ieee.org
Industry 4.0 as a driving force is making huge strides, particularly in the manufacturing
sector, where all integral components involved in the production processes are getting …
sector, where all integral components involved in the production processes are getting …
HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants
J Carrillo-Mondéjar, H Turtiainen… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) devices and their firmware are notorious for their lifelong
vulnerabilities. As device infection increases, vendors also fail to release patches at a …
vulnerabilities. As device infection increases, vendors also fail to release patches at a …
Lightweight flexible group authentication utilizing historical collaboration process information
Existing device authentication techniques may suffer from heavy communication,
computation, and storage overhead for identifying a growing number of devices in …
computation, and storage overhead for identifying a growing number of devices in …
ScalaCert: Scalability-Oriented PKI with Redactable Consortium Blockchain Enabled" On-Cert" Certificate Revocation
As the voucher for identity, digital certificates and the public key infrastructure (PKI) system
have always played a vital role to provide the authentication services. In recent years, with …
have always played a vital role to provide the authentication services. In recent years, with …