Using provenance and CoAP to track requests/responses in IoT

E Kaku, RK Lomotey, R Deters - Procedia Computer Science, 2016 - Elsevier
Until recently, not much attention has been drawn to the need to provide documentary
evidence for ensuring reliability, transparency and, most importantly, tracing the source of …

[HTML][HTML] Security implications for ultra-low power configurable SoC FPAA embedded systems

J Hasler, S Shah - Journal of Low Power Electronics and Applications, 2018 - mdpi.com
We discuss the impact of physical computing techniques to classifying network security
issues for ultra-low power networked IoT devices. Physical computing approaches enable at …

Post-quantum cryptography for embedded systems

CA Lara-Nino, A Diaz-Perez… - 2022 IEEE Mexican …, 2022 - ieeexplore.ieee.org
Over the years, important breakthroughs have been made in protecting data at rest or in-
transit. The emergence of the Internet of Things (IoT) and Cyber Physical Systems (CPS) has …

Privacy improvement architecture for IoT

E Kak, R Orji, J Pry, K Sofranko… - … Congress on Internet …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is inspired by network interconnectedness of humans, objects,
and cloud services to facilitate new use cases and new business models across multiple …

[PDF][PDF] Securing publish-subscribe services with dynamic security protocol in MQTT enabled internet of things

A Bashir, AH Mir - Int. J. Secur. Appl, 2017 - academia.edu
Rapid developments in the field of embedded system, sensor technology, IP addressing and
wireless communication are driving the growth of Internet of Things (IoT) in a variety of …

A systematic literature review on the security challenges of Internet of Things and their classification

K Fazal, H Shehzad, A Tasneem… - … of Technology and …, 2017 - search.proquest.com
Internet of things (IoT) is an emerging technology. IoT aims at interconnecting devices and
people to the internet, but in meanwhile there are some security and privacy threats as …

Network security protocol for constrained resource devices in Internet of things

S Mishra - 2015 Annual IEEE India Conference (INDICON), 2015 - ieeexplore.ieee.org
Security protocols built on strong cryptographic algorithms to defeat attempts of pattern
analysis are popular nowadays, but these algorithms consume a lot of processor's efficiency …

Smart grid security applied to the brazilian scenario: A visual approach

M Rogozinski, RF Calili - IEEE Latin America Transactions, 2021 - ieeexplore.ieee.org
Many countries are experiencing a transformation from the traditional generation power
system into a smart grid which incorporates communication and data processing …

Comprehensive threat analysis and activity modelling of physical layer attacks in internet of things

MB Salunke, PN Mahalle… - Handbook on ICT in …, 2022 - api.taylorfrancis.com
The term 'Internet of Things' was first coined by Kevin Ashtonin 1999, which is a
technological revolution that represents the future of computing and communications (Rose …

Enhancing Security in Industrial IoT: A Taxonomy-driven Approach to Risk Assessment

M Al-Hawawreh, R Doss - … on Trust, Security and Privacy in …, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) embodies the emerging fourth revolution, which
strongly focuses on Machine-to-Machine (M2M) communications, big data, and predictive …