Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective

G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …

A systematic survey: Security threats to UAV-aided IoT applications, taxonomy, current challenges and requirements with future research directions

M Adil, MA Jan, Y Liu, H Abulkasim… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) as an intermediary can offer an efficient and useful
communication paradigm for different Internet of Things (IoT) applications. Following the …

Hyperledger fabric blockchain for securing the edge internet of things

H Honar Pajooh, M Rashid, F Alam, S Demidenko - Sensors, 2021 - mdpi.com
Providing security and privacy to the Internet of Things (IoT) networks while achieving it with
minimum performance requirements is an open research challenge. Blockchain technology …

Technological transformation of telco operators towards seamless iot edge-cloud continuum

K Oztoprak, YK Tuncel, I Butun - Sensors, 2023 - mdpi.com
This article investigates and discusses challenges in the telecommunication field from
multiple perspectives, both academic and industry sides are catered for, surveying the main …

Hardware security for Internet of Things identity assurance

A Cirne, PR Sousa, JS Resende… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …

A review of distributed access control for blockchain systems towards securing the internet of things

I Butun, P Österberg - IEEE Access, 2020 - ieeexplore.ieee.org
As the Internet of Things (IoT) paradigm gets more attention from academia and industry,
implementation tools of IoT will be explored more and more. One example is the applicability …

Enabling security services in socially assistive robot scenarios for healthcare applications

A Vulpe, R Crăciunescu, AM Drăgulinescu… - Sensors, 2021 - mdpi.com
Today's IoT deployments are highly complex, heterogeneous and constantly changing. This
poses severe security challenges such as limited end-to-end security support, lack of cross …

Intrinsic random optical features of the electronic packages as physical unclonable functions for internet of things security

Q Li, F Chen, J Kang, P Wang, J Su… - Advanced Photonics …, 2022 - Wiley Online Library
The increasing security threat is a serious challenge to the internet of things (IoT). Hardware‐
based security primitive is an essential and powerful way to protect IoT devices from various …

Ultrafast Near‐Ideal Phase‐Change Memristive Physical Unclonable Functions Driven by Amorphous State Variations

SX Go, Q Wang, KG Lim, TH Lee, N Bajalovic… - Advanced …, 2022 - Wiley Online Library
There is an ever‐increasing demand for next‐generation devices that do not require
passwords and are impervious to cloning. For traditional hardware security solutions in edge …

Agile-AES: Implementation of configurable AES primitive with agile design approach

X Guo, M El-Hadedy, S Mosanu, X Wei, K Skadron… - Integration, 2022 - Elsevier
In the data-centric era, interconnected devices must be able to communicate efficiently and
securely with their hosts even over untrusted networks. This led to the adoption of several …