Distributed Blockchain‐Based Platform for Unmanned Aerial Vehicles

T Ahamed Ahanger, A Aldaej… - Computational …, 2022 - Wiley Online Library
Internet of Things (IoT)‐inspired drone environment is having a greater influence on daily
lives in the form of drone‐based smart electricity monitoring, traffic routing, and personal …

Designing a micro-moving target ipv6 defense for the internet of things

K Zeitz, M Cantrell, R Marchany, J Tront - Proceedings of the Second …, 2017 - dl.acm.org
As the use of low-power and low-resource embedded devices continues to increase
dramatically with the introduction of new Internet of Things (IoT) devices, security techniques …

[PDF][PDF] A Comprehensive Survey of internet of things applications, Threats, and Security Issues

YH Reddy, A Ali, PV Kumar, MH Srinivas… - South Asian Res J …, 2022 - researchgate.net
The Internet of Things (IoT) is a novel way of providing a wide range of solutions. The IoT
includes a variety of small smart devices. Their use, size, power, and computation power …

[PDF][PDF] IoT device identity management and blockchain for security and data integrity

P Gangwani, S Joshi, H Upadhyay, L Lagos - Int. J. Comput. Appl, 2023 - academia.edu
Human-human or human-device communication has traditionally been the most prevalent
kind of communication, however, the Internet of Things (IoT) promises to dramatically …

Security Checking of Trigger-Action-Programming Smart Home Integrations

L Bu, Q Zhang, S Li, J Dai, G Bai, K Chen… - Proceedings of the 32nd …, 2023 - dl.acm.org
Internet of Things (IoT) has become prevalent in various fields, especially in the context of
home automation (HA). To better control HA-IoT devices, especially to integrate several …

[PDF][PDF] Digitalization of pharmaceutical cold chain systems using IoT digital enabler

M Shashi - Int J Eng Adv Technol, 2022 - researchgate.net
Compared to the other classic supply chain, the pharmaceutical supply chain has many
critical challenges, such as cold chain transportation, temperature monitoring, long lead …

[PDF][PDF] Extending the cloud with fog: Security challenges & opportunities

J Shropshire - 2014 - scholar.archive.org
Fog is an emerging computing paradigm which provides storage, processing, and
communication services closer to the end user. It reduces latency, provides location …

[图书][B] Internet of Things Security: Principles, Applications, Attacks, and Countermeasures

BB Gupta, M Quamara - 2020 - taylorfrancis.com
The Internet of Things (IoT), with its technological advancements and massive innovations,
is building the idea of inter-connectivity among everyday life objects. With an explosive …

Understanding security requirements and challenges in internet of things (IoTs): A review

FI Khan, S Hameed - arXiv preprint arXiv:1808.10529, 2018 - arxiv.org
Internet of Things (IoT) is realized by the idea of free flow of information amongst various low
power embedded devices that use Internet to communicate with one another. It is predicted …

Designing a smart multisensor framework based on beaglebone black board

A Chianese, F Piccialli, G Riccio - Computer Science and its Applications …, 2015 - Springer
This paper presents an intelligent multisensor framework based on the BeableBone Black
platform, a complete open hardware and software embedded computer; the challenge is to …