Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) systems in different areas, such as manufacturing,
transportation, and healthcare, are the convergence of several technologies. There are …

Ranking security of IoT-based smart home consumer devices

NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …

A blockchain-based security and trust mechanism for AI-enabled IIoT systems

F Zhang, H Wang, L Zhou, D Xu, L Liu - Future Generation Computer …, 2023 - Elsevier
The complexity and heterogeneity of artificial intelligence (AI) enabled industrial Internet of
things (IIoT) lead to lacks of mutual trust between devices and directly affects the data …

[PDF][PDF] Distributed Timestamp Mechanism Based on Verifiable Delay Functions.

Q Wu, Z Han, G Mohiuddin, Y Ren - Computer Systems Science …, 2023 - cdn.techscience.cn
In the data communication system, the real-time information interaction of communication
device increases the risk of privacy sensitive data being tampered with. Therefore …

Data-agnostic model poisoning against federated learning: A graph autoencoder approach

K Li, J Zheng, X Yuan, W Ni, OB Akan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper proposes a novel, data-agnostic, model poisoning attack on Federated Learning
(FL), by designing a new adversarial graph autoencoder (GAE)-based framework. The …

[HTML][HTML] Nested Bee Hive: A conceptual multilayer architecture for 6G in futuristic sustainable smart cities

MS Farooq, RM Nadir, F Rustam, S Hur, Y Park… - Sensors, 2022 - mdpi.com
Several smart city ideas are introduced to manage various problems caused by
overpopulation, but the futuristic smart city is a concept based on dense and artificial …

SECS/GEMsec: A mechanism for detection and prevention of cyber-attacks on SECS/GEM communications in industry 4.0 landscape

SUA Laghari, S Manickam, AK Al-Ani… - Ieee …, 2021 - ieeexplore.ieee.org
Industry 4.0 as a driving force is making huge strides, particularly in the manufacturing
sector, where all integral components involved in the production processes are getting …

HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants

J Carrillo-Mondéjar, H Turtiainen… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) devices and their firmware are notorious for their lifelong
vulnerabilities. As device infection increases, vendors also fail to release patches at a …

Lightweight flexible group authentication utilizing historical collaboration process information

H Fang, Z Xiao, X Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Existing device authentication techniques may suffer from heavy communication,
computation, and storage overhead for identifying a growing number of devices in …

ScalaCert: Scalability-Oriented PKI with Redactable Consortium Blockchain Enabled" On-Cert" Certificate Revocation

X Luo, Z Xu, K Xue, Q Jiang, R Li… - 2022 IEEE 42nd …, 2022 - ieeexplore.ieee.org
As the voucher for identity, digital certificates and the public key infrastructure (PKI) system
have always played a vital role to provide the authentication services. In recent years, with …