Blockchain-based lightweight and secured v2v communication in the internet of vehicles

M Kamal, G Srivastava, M Tariq - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Vehicle to vehicle (V2V) communication has gained importance in recent times because of
the increasing number of traffic accidents and advancements in information sharing. A …

Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective

G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …

Vulnerability studies and security postures of IoT devices: A smart home case study

BD Davis, JC Mason, M Anwar - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) technology has revolutionized our daily lives in many ways-whether
it is the way we conduct our day-to-day activities inside our home, or the way we control our …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks

J Roldán, J Boubeta-Puig, JL Martínez… - Expert Systems with …, 2020 - Elsevier
Abstract The Internet of Things (IoT) is growing globally at a fast pace: people now find
themselves surrounded by a variety of IoT devices such as smartphones and wearables in …

[HTML][HTML] Secure blockchain middleware for decentralized iiot towards industry 5.0: A review of architecture, enablers, challenges, and directions

J Leng, Z Chen, Z Huang, X Zhu, H Su, Z Lin, D Zhang - Machines, 2022 - mdpi.com
Resilient manufacturing is a vision in the Industry 5.0 blueprint for satisfying sustainable
development goals under pandemics or the rising individualized product needs. A resilient …

[HTML][HTML] Security in product lifecycle of IoT devices: A survey

N Yousefnezhad, A Malhi, K Främling - Journal of Network and Computer …, 2020 - Elsevier
Abstract The Internet of Things (IoT) paradigm is considerably impacted by security
challenges, which has lately demanded substantial consideration. Accordingly, certain …

Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication

A Diro, H Reda, N Chilamkurti, A Mahmood… - IEEE …, 2020 - ieeexplore.ieee.org
The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a
significant challenge for securing IoT applications. This necessitates a robust and …

Review of internet of things (iot) for future generation wireless communications

DN Venu, A Arun Kumar… - International Journal for …, 2022 - papers.ssrn.com
Abstract The Internet of Things (IoT) emerged as a result of technological advancements that
enabled efficient wireless tiny devices. This study explores the role of IoT in various fields …

[HTML][HTML] Security and internet of things: benefits, challenges, and future perspectives

H Taherdoost - Electronics, 2023 - mdpi.com
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate
their efforts on system security. Any vulnerability could lead to a system failure or …