An index-based provenance compression scheme for identifying malicious nodes in multihop IoT network
Z Liu, Y Wu - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Data provenance is an effective method to evaluate data reliability and has become a
research hotspot in recent years. However, the size of the data provenance will increase …
research hotspot in recent years. However, the size of the data provenance will increase …
Novel randomized placement for FPGA based robust ROPUF with improved uniqueness
AS Chauhan, V Sahula, AS Mandal - Journal of Electronic Testing, 2019 - Springer
The physical unclonable functions (PUFs) are used to provide software as well as hardware
security for the cyber-physical systems. They have been used for performing significant …
security for the cyber-physical systems. They have been used for performing significant …
Security challenges and solutions in IoT networks for the smart cities
A Procopiou, TM Chen - Internet of Things, 2022 - taylorfrancis.com
It is estimated that by 2030, more than 60% of the population is going to live in cities.
Overpopulation in urban cities causes numerous problems including environmental …
Overpopulation in urban cities causes numerous problems including environmental …
Data provenance in security and privacy
Provenance information corresponds to essential metadata that describes the entities, users,
and processes involved in the history and evolution of a data object. The benefits of tracking …
and processes involved in the history and evolution of a data object. The benefits of tracking …
Secure split test techniques to prevent IC piracy for IoT devices
Globalization of semiconductor manufacturing and related activities has led to several
security issues like counterfeiting, IP infringement and cloning etc. Counterfeiting not only …
security issues like counterfeiting, IP infringement and cloning etc. Counterfeiting not only …
Contributing to current challenges in identity and access management with visual analytics
Enterprises have embraced identity and access management (IAM) systems as central point
to manage digital identities and to grant or remove access to information. However, as IAM …
to manage digital identities and to grant or remove access to information. However, as IAM …
[PDF][PDF] Understanding of Network Resiliency in Communication Networks with its Integration in Internet of Things-A Survey.
Modern life is completely dependent on Internet, and as a result, network disruption has
become extremely severe. It has been recognized that communication networks are not that …
become extremely severe. It has been recognized that communication networks are not that …
Application study of hardware-based security for future industrial IoT
R Matischek, B Bara - 2019 22nd Euromicro Conference on …, 2019 - ieeexplore.ieee.org
The stepwise evolution of conventional production facilities into future Smart Factory or
Industrial IoT paradigms entails special requirements on future industrial devices and …
Industrial IoT paradigms entails special requirements on future industrial devices and …
CloudIoT‐driven healthcare: review, architecture, security implications, and open research issues
Summary The blending of Cloud Computing and IoT or CloudIoT provides an efficient
paradigm to connect varied medical resources and dispense efficient, reliable, agile, and …
paradigm to connect varied medical resources and dispense efficient, reliable, agile, and …
Addressing security and privacy challenges in Internet of Things
A Mosenia - 2017 - search.proquest.com
Abstract Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
holistic and transformative approach for providing numerous services. The rapid …
holistic and transformative approach for providing numerous services. The rapid …