A comprehensive survey of blockchain: From theory to IoT applications and beyond

M Wu, K Wang, X Cai, S Guo, M Guo… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
As an innovated and revolutionized technology, blockchain has been applied in many fields,
such as cryptocurrency, food traceability, identity management, or even market prediction …

Agent-based Internet of Things: State-of-the-art and research challenges

C Savaglio, M Ganzha, M Paprzycki, C Bădică… - Future Generation …, 2020 - Elsevier
The disruptive potentials of the Internet of Things (IoT) entails multifaceted requirements and
development issues (large scale deployments, heterogeneity, cyberphysicality …

Blockchain-based security mechanisms for IoMT Edge networks in IoMT-based healthcare monitoring systems

F Pelekoudas-Oikonomou, G Zachos, M Papaioannou… - Sensors, 2022 - mdpi.com
Despite the significant benefits that the rise of Internet of Medical Things (IoMT) can bring
into citizens' quality of life by enabling IoMT-based healthcare monitoring systems, there is …

A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

A survey of IoT and blockchain integration: Security perspective

EA Shammar, AT Zahary, AA Al-Shargabi - IEEE Access, 2021 - ieeexplore.ieee.org
Blockchain has recently attracted significant academic attention in research fields beyond
the financial industry. In the Internet of Things (IoT), blockchain can be used to create a …

Designing collaborative blockchained signature-based intrusion detection in IoT environments

W Li, S Tug, W Meng, Y Wang - Future Generation Computer Systems, 2019 - Elsevier
With the rapid development of Internet-of-Things (IoT), there is an increasing demand for
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …

Augmenting zero trust architecture to endpoints using blockchain: A state‐of‐the‐art review

L Alevizos, VT Ta, M Hashem Eiza - Security and privacy, 2022 - Wiley Online Library
With the purpose of defending against lateral movement in today's borderless networks, zero
trust architecture (ZTA) adoption is gaining momentum. With a full‐scale ZTA …

An intrusion detection framework for energy constrained IoT devices

J Arshad, MA Azad, MM Abdeltaif, K Salah - Mechanical Systems and …, 2020 - Elsevier
Abstract Industrial Internet of Things (IIoT) exemplifies IoT with applications in
manufacturing, surveillance, automotive, smart buildings, homes and transport. It leverages …

{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks

P Rieger, M Chilese, R Mohamed, M Miettinen… - 32nd USENIX Security …, 2023 - usenix.org
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …

A review of performance, energy and privacy of intrusion detection systems for IoT

J Arshad, MA Azad, R Amad, K Salah, M Alazab… - Electronics, 2020 - mdpi.com
Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling
development of future cities that are inherently sustainable. Intrusion detection for such …