Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey

S Zaman, K Alhazmi, MA Aseeri, MR Ahmed… - Ieee …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …

A survey on internet-of-things security: threats and emerging countermeasures

D Swessi, H Idoudi - Wireless Personal Communications, 2022 - Springer
Internet of things (IoT) is a world wide network and set of paradigms that are intended to
allow communications between anything, anytime and anywhere. However, connected …

Digital twin-driven intelligence disaster prevention and mitigation for infrastructure: Advances, challenges, and opportunities

D Yu, Z He - Natural hazards, 2022 - Springer
Natural hazards, which have the potential to cause catastrophic damage and loss to
infrastructure, have increased significantly in recent decades. Thus, the construction …

Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …

Overview of cyber security in the industry 4.0 era

A Ustundag, E Cevikcan, BC Ervural… - Industry 4.0: managing the …, 2018 - Springer
The global development industry is in the midst of a transformation to meet today's more
complex and highly competitive industry demands. With the rapid advances in technology, a …

Enabling attribute revocation for fine-grained access control in blockchain-IoT systems

G Yu, X Zha, X Wang, W Ni, K Yu, P Yu… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
The attribute-based encryption (ABE) has drawn a lot of attention for fine-grained access
control in blockchains, especially in blockchain-enabled tampering-resistant Internet-of …

A taxonomy of security issues in Industrial Internet-of-Things: Scoping review for existing solutions, future implications, and research challenges

P Jayalaxmi, R Saha, G Kumar, N Kumar… - IEEE Access, 2021 - ieeexplore.ieee.org
Industrial Internet of Things (IIoTs) are the extensions of the Internet of Things (IoTs) and
have paved the way towards the industry revolution 4.0. IIoT accelerates the industry …

A survey on continuous authentication methods in Internet of Things environment

FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …

Security of Internet of Things (IoT) using federated learning and deep learning—Recent advancements, issues and prospects

V Gugueoth, S Safavat, S Shetty - ICT Express, 2023 - Elsevier
There is a great demand for an efficient security framework which can secure IoT systems
from potential adversarial attacks. However, it is challenging to design a suitable security …