A comprehensive survey of blockchain: From theory to IoT applications and beyond
As an innovated and revolutionized technology, blockchain has been applied in many fields,
such as cryptocurrency, food traceability, identity management, or even market prediction …
such as cryptocurrency, food traceability, identity management, or even market prediction …
Agent-based Internet of Things: State-of-the-art and research challenges
The disruptive potentials of the Internet of Things (IoT) entails multifaceted requirements and
development issues (large scale deployments, heterogeneity, cyberphysicality …
development issues (large scale deployments, heterogeneity, cyberphysicality …
Blockchain-based security mechanisms for IoMT Edge networks in IoMT-based healthcare monitoring systems
Despite the significant benefits that the rise of Internet of Medical Things (IoMT) can bring
into citizens' quality of life by enabling IoMT-based healthcare monitoring systems, there is …
into citizens' quality of life by enabling IoMT-based healthcare monitoring systems, there is …
A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
A survey of IoT and blockchain integration: Security perspective
Blockchain has recently attracted significant academic attention in research fields beyond
the financial industry. In the Internet of Things (IoT), blockchain can be used to create a …
the financial industry. In the Internet of Things (IoT), blockchain can be used to create a …
Designing collaborative blockchained signature-based intrusion detection in IoT environments
With the rapid development of Internet-of-Things (IoT), there is an increasing demand for
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …
Augmenting zero trust architecture to endpoints using blockchain: A state‐of‐the‐art review
With the purpose of defending against lateral movement in today's borderless networks, zero
trust architecture (ZTA) adoption is gaining momentum. With a full‐scale ZTA …
trust architecture (ZTA) adoption is gaining momentum. With a full‐scale ZTA …
An intrusion detection framework for energy constrained IoT devices
Abstract Industrial Internet of Things (IIoT) exemplifies IoT with applications in
manufacturing, surveillance, automotive, smart buildings, homes and transport. It leverages …
manufacturing, surveillance, automotive, smart buildings, homes and transport. It leverages …
{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …
control various functions in smart homes and buildings, smart cities, and smart factories …
A review of performance, energy and privacy of intrusion detection systems for IoT
Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling
development of future cities that are inherently sustainable. Intrusion detection for such …
development of future cities that are inherently sustainable. Intrusion detection for such …