An index-based provenance compression scheme for identifying malicious nodes in multihop IoT network

Z Liu, Y Wu - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Data provenance is an effective method to evaluate data reliability and has become a
research hotspot in recent years. However, the size of the data provenance will increase …

Novel randomized placement for FPGA based robust ROPUF with improved uniqueness

AS Chauhan, V Sahula, AS Mandal - Journal of Electronic Testing, 2019 - Springer
The physical unclonable functions (PUFs) are used to provide software as well as hardware
security for the cyber-physical systems. They have been used for performing significant …

Security challenges and solutions in IoT networks for the smart cities

A Procopiou, TM Chen - Internet of Things, 2022 - taylorfrancis.com
It is estimated that by 2030, more than 60% of the population is going to live in cities.
Overpopulation in urban cities causes numerous problems including environmental …

Data provenance in security and privacy

B Pan, N Stakhanova, S Ray - ACM Computing Surveys, 2023 - dl.acm.org
Provenance information corresponds to essential metadata that describes the entities, users,
and processes involved in the history and evolution of a data object. The benefits of tracking …

Secure split test techniques to prevent IC piracy for IoT devices

KS Kumar, GH Rao, S Sahoo, KK Mahapatra - Integration, 2017 - Elsevier
Globalization of semiconductor manufacturing and related activities has led to several
security issues like counterfeiting, IP infringement and cloning etc. Counterfeiting not only …

Contributing to current challenges in identity and access management with visual analytics

A Puchta, F Böhm, G Pernul - Data and Applications Security and Privacy …, 2019 - Springer
Enterprises have embraced identity and access management (IAM) systems as central point
to manage digital identities and to grant or remove access to information. However, as IAM …

[PDF][PDF] Understanding of Network Resiliency in Communication Networks with its Integration in Internet of Things-A Survey.

S Sharma, BK Pathak, R Kumar - Electrica, 2023 - electricajournal.org
Modern life is completely dependent on Internet, and as a result, network disruption has
become extremely severe. It has been recognized that communication networks are not that …

Application study of hardware-based security for future industrial IoT

R Matischek, B Bara - 2019 22nd Euromicro Conference on …, 2019 - ieeexplore.ieee.org
The stepwise evolution of conventional production facilities into future Smart Factory or
Industrial IoT paradigms entails special requirements on future industrial devices and …

CloudIoT‐driven healthcare: review, architecture, security implications, and open research issues

JL Shah, HF Bhat, AI Khan - Advanced Healthcare Systems …, 2022 - Wiley Online Library
Summary The blending of Cloud Computing and IoT or CloudIoT provides an efficient
paradigm to connect varied medical resources and dispense efficient, reliable, agile, and …

Addressing security and privacy challenges in Internet of Things

A Mosenia - 2017 - search.proquest.com
Abstract Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
holistic and transformative approach for providing numerous services. The rapid …