Development of IIoT monitoring and control security scheme for cyber physical systems
A Wadsworth, MI Thanoon, C McCurry… - 2019 …, 2019 - ieeexplore.ieee.org
Industry 4.0 or the fourth industrial revolution encapsulates future industry development
trends to achieve more intelligent manufacturing processes, including reliance on Cyber …
trends to achieve more intelligent manufacturing processes, including reliance on Cyber …
Security Challenges and Issues in IoT
Internet of Things (IoT) is sometimes called the internet of devices. In IoT, environment
devices are connected with the help of gateways. All required information can be accessed …
devices are connected with the help of gateways. All required information can be accessed …
A top-down survey on securing IoT with machine learning: goals, recent advances and challenges
The Internet of Things (IoT) has seen it all from being just another innovation to a leading
technology; it is now a binding force that interconnects various aspects of our lives. The IoT's …
technology; it is now a binding force that interconnects various aspects of our lives. The IoT's …
Iot security in wireless devices
R Gauniyal, S Jain - 2019 3rd International conference on …, 2019 - ieeexplore.ieee.org
IoT is evolving as a combination of interconnected devices over a particular network. In the
proposed paper, we discuss about the security of IoT system in the wireless devices. IoT …
proposed paper, we discuss about the security of IoT system in the wireless devices. IoT …
Efficient energy management in smart homes using IoT-based low-power wide-area network (LoRaWAN) protocol
A falah ALjawahery, AA Ibrahim - 2020 4th International …, 2020 - ieeexplore.ieee.org
In this research paper a prototype using IOT-based Low-power wide-area network
(LoRaWAN) and Sigfox technology was developed for the energy efficient management in …
(LoRaWAN) and Sigfox technology was developed for the energy efficient management in …
Experimental study of location spoofing and identity spoofing attack in internet of things network
IoT devices are placed at open places, generally at where monitoring and controlling of
devices from remote location is difficult. Location spoofing is a threat in which an intruder …
devices from remote location is difficult. Location spoofing is a threat in which an intruder …
Security considerations in the Internet of Things Protocol Stack
KK Nair, HD Nair - … Intelligence, Big Data, Computing and Data …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) wireless devices has the capability to interconnect small footprint
devices and its key purpose is to have seamless connection without operational barriers. It is …
devices and its key purpose is to have seamless connection without operational barriers. It is …
A systematic review of authentication methods for internet of things
Internet of things is becoming the most important technology now a days and it is next era of
communication. By the use of IOT, various physical things can communicate, interact and …
communication. By the use of IOT, various physical things can communicate, interact and …
Sustainable Paradigm for Computing the Security of Wireless Internet of Things: Blockchain Technology
Advanced computerization, emerging paradigm, and expeditious growth of the wireless
Internet of Things (IoT) system functions with the use of sensors, actuators, and translators …
Internet of Things (IoT) system functions with the use of sensors, actuators, and translators …
The Internet of Things and Its Potential for Industrial Processes
F Pilati, D Fontanelli, D Brunelli - IEEE Technology and …, 2023 - Wiley Online Library
It has been a decade since the definition of Industry 4.0 has been proposed for the first time
at the Hannover Messe in Germany in 2011. Despite this relatively wide time, a clear …
at the Hannover Messe in Germany in 2011. Despite this relatively wide time, a clear …