Personal data privacy challenges of the fourth industrial revolution

MMH Onik, KIM Chul-Soo… - 2019 21st International …, 2019 - ieeexplore.ieee.org
Fourth industrial revolution (Industry 4.0) promises a connected and smart manufacturing
system where internet, machine (physical system) and humans lumped together. Unlike …

[HTML][HTML] Towards a hybrid deep learning model for anomalous activities detection in internet of things networks

I Ullah, A Ullah, M Sajjad - IoT, 2021 - mdpi.com
The tremendous number of Internet of Things (IoT) applications, with their ubiquity, has
provided us with unprecedented productivity and simplified our daily life. At the same time …

Cost optimization of secure routing with untrusted devices in software defined networking

A Yazdinejad, RM Parizi, A Dehghantanha… - Journal of Parallel and …, 2020 - Elsevier
Over the years, switches and network routers have been compromised frequently, and a lot
of vulnerabilities have occurred in network infrastructure. Secure routing (SR) is one of the …

[HTML][HTML] BCoT sentry: A blockchain-based identity authentication framework for IoT devices

L Gong, DM Alghazzawi, L Cheng - Information, 2021 - mdpi.com
In Internet of Things (IoT) environments, privacy and security are among some of the
significant challenges. Recently, several studies have attempted to apply blockchain …

Policy-based access control for constrained healthcare resources in the context of the Internet of Things

S Pal, M Hitchens, V Varadharajan… - Journal of Network and …, 2019 - Elsevier
Abstract The Internet of Things (IoT), smart sensors and mobile wearable devices are
helping to provide healthcare systems that are more ubiquitous, smarter, faster and easily …

Cyber forensics framework for big data analytics in IoT environment using machine learning

GS Chhabra, VP Singh, M Singh - Multimedia Tools and Applications, 2020 - Springer
Forensic analyst skills are at stake for processing of growing data from IoT based
environment platforms. Tangible sources often have the size limits, but that's not the case for …

[PDF][PDF] A Comparative Study on Frameworks, MAC Layer Protocols and Open Research Issues in Internet of Things.

B Sharma, MS Obaidat, K Singh… - Adhoc & Sensor Wireless …, 2019 - researchgate.net
The demand of Internet application development is very high and growing rapidly with time.
A collection of protocols, standards and rules which helps in the development of IoT …

Internet-based intelligent and sustainable manufacturing: developments and challenges

K Li, T Zhou, B Liu - The International Journal of Advanced Manufacturing …, 2020 - Springer
In recent years, the nations of the world have presented the development strategy of
manufacturing. Manufacturing is the foundation of a country. However, with the increasing …

Beyond traditional threats: A persistent backdoor attack on federated learning

T Liu, Y Zhang, Z Feng, Z Yang, C Xu, D Man… - Proceedings of the …, 2024 - ojs.aaai.org
Backdoors on federated learning will be diluted by subsequent benign updates. This is
reflected in the significant reduction of attack success rate as iterations increase, ultimately …

Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions

VR Kebande, AI Awad - ACM Computing Surveys, 2024 - dl.acm.org
The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0
revolution, which is projected to continue accelerating and realizing digital transformations …