Development of IIoT monitoring and control security scheme for cyber physical systems

A Wadsworth, MI Thanoon, C McCurry… - 2019 …, 2019 - ieeexplore.ieee.org
Industry 4.0 or the fourth industrial revolution encapsulates future industry development
trends to achieve more intelligent manufacturing processes, including reliance on Cyber …

Security Challenges and Issues in IoT

S Kumar, SS Deora - 2021 6th International Conference on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is sometimes called the internet of devices. In IoT, environment
devices are connected with the help of gateways. All required information can be accessed …

A top-down survey on securing IoT with machine learning: goals, recent advances and challenges

S Iqbal, S Qureshi - International Journal of Wireless and …, 2022 - inderscienceonline.com
The Internet of Things (IoT) has seen it all from being just another innovation to a leading
technology; it is now a binding force that interconnects various aspects of our lives. The IoT's …

Iot security in wireless devices

R Gauniyal, S Jain - 2019 3rd International conference on …, 2019 - ieeexplore.ieee.org
IoT is evolving as a combination of interconnected devices over a particular network. In the
proposed paper, we discuss about the security of IoT system in the wireless devices. IoT …

Efficient energy management in smart homes using IoT-based low-power wide-area network (LoRaWAN) protocol

A falah ALjawahery, AA Ibrahim - 2020 4th International …, 2020 - ieeexplore.ieee.org
In this research paper a prototype using IOT-based Low-power wide-area network
(LoRaWAN) and Sigfox technology was developed for the energy efficient management in …

Experimental study of location spoofing and identity spoofing attack in internet of things network

M Mehta, K Patel - International Journal of Intelligent Information …, 2022 - igi-global.com
IoT devices are placed at open places, generally at where monitoring and controlling of
devices from remote location is difficult. Location spoofing is a threat in which an intruder …

Security considerations in the Internet of Things Protocol Stack

KK Nair, HD Nair - … Intelligence, Big Data, Computing and Data …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) wireless devices has the capability to interconnect small footprint
devices and its key purpose is to have seamless connection without operational barriers. It is …

A systematic review of authentication methods for internet of things

M Mehta, H Baldaniya, N Goriya - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Internet of things is becoming the most important technology now a days and it is next era of
communication. By the use of IOT, various physical things can communicate, interact and …

Sustainable Paradigm for Computing the Security of Wireless Internet of Things: Blockchain Technology

S Zeba, M Amjad, DR Rizvi - Smart and Sustainable …, 2022 - Wiley Online Library
Advanced computerization, emerging paradigm, and expeditious growth of the wireless
Internet of Things (IoT) system functions with the use of sensors, actuators, and translators …

The Internet of Things and Its Potential for Industrial Processes

F Pilati, D Fontanelli, D Brunelli - IEEE Technology and …, 2023 - Wiley Online Library
It has been a decade since the definition of Industry 4.0 has been proposed for the first time
at the Hannover Messe in Germany in 2011. Despite this relatively wide time, a clear …