Blockchain-based lightweight and secured v2v communication in the internet of vehicles
Vehicle to vehicle (V2V) communication has gained importance in recent times because of
the increasing number of traffic accidents and advancements in information sharing. A …
the increasing number of traffic accidents and advancements in information sharing. A …
Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective
G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …
devices act in concert, rarely requiring human intervention, posing significant challenges in …
Vulnerability studies and security postures of IoT devices: A smart home case study
Internet-of-Things (IoT) technology has revolutionized our daily lives in many ways-whether
it is the way we conduct our day-to-day activities inside our home, or the way we control our …
it is the way we conduct our day-to-day activities inside our home, or the way we control our …
Attacks and defenses in short-range wireless technologies for IoT
K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …
wireless and wired networks, geographically distributed and interconnected by a “secured” …
Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks
Abstract The Internet of Things (IoT) is growing globally at a fast pace: people now find
themselves surrounded by a variety of IoT devices such as smartphones and wearables in …
themselves surrounded by a variety of IoT devices such as smartphones and wearables in …
[HTML][HTML] Secure blockchain middleware for decentralized iiot towards industry 5.0: A review of architecture, enablers, challenges, and directions
J Leng, Z Chen, Z Huang, X Zhu, H Su, Z Lin, D Zhang - Machines, 2022 - mdpi.com
Resilient manufacturing is a vision in the Industry 5.0 blueprint for satisfying sustainable
development goals under pandemics or the rising individualized product needs. A resilient …
development goals under pandemics or the rising individualized product needs. A resilient …
[HTML][HTML] Security in product lifecycle of IoT devices: A survey
Abstract The Internet of Things (IoT) paradigm is considerably impacted by security
challenges, which has lately demanded substantial consideration. Accordingly, certain …
challenges, which has lately demanded substantial consideration. Accordingly, certain …
Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication
The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a
significant challenge for securing IoT applications. This necessitates a robust and …
significant challenge for securing IoT applications. This necessitates a robust and …
Review of internet of things (iot) for future generation wireless communications
DN Venu, A Arun Kumar… - International Journal for …, 2022 - papers.ssrn.com
Abstract The Internet of Things (IoT) emerged as a result of technological advancements that
enabled efficient wireless tiny devices. This study explores the role of IoT in various fields …
enabled efficient wireless tiny devices. This study explores the role of IoT in various fields …
[HTML][HTML] Security and internet of things: benefits, challenges, and future perspectives
H Taherdoost - Electronics, 2023 - mdpi.com
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate
their efforts on system security. Any vulnerability could lead to a system failure or …
their efforts on system security. Any vulnerability could lead to a system failure or …