Three-tier storage framework based on TBchain and IPFS for protecting IoT security and privacy

Y Li, Y Yu, X Wang - ACM Transactions on Internet Technology, 2023 - dl.acm.org
Recently, most of the Internet of things (IoT) infrastructures are highly centralized with single
points of failure, which results in serious security and privacy issues of IoT data. Fortunately …

Output Positioning to Derive Maximum Entropy From Physical Unclonable Functions

S Abdolinezhad, L Zimmermann… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are increasingly generating attention in the field of
hardware-based security for the Internet of Things (IoT). A PUF, as its name implies, is a …

Cyber-security of industrial internet of things in electric power systems

H Sarjan, A Ameli, M Ghafouri - IEEE Access, 2022 - ieeexplore.ieee.org
Electric Power Systems (EPSs) are among the most critical infrastructures of any society,
since they significantly impact other infrastructures. Recently, there has been a trend toward …

Assistive Technology and Internet of Things for people with ADHD

I Moraiti, A Fotoglou, K Dona, A Katsimperi… - Technium Soc. Sci …, 2022 - HeinOnline
This article focuses on how people with disabilities can benefit from new technologies and in
particular assistive technology and Internet of Things Applications. Assistive Technology is …

[PDF][PDF] Smart Intrusion Detection in IoT Edge Computing Using Federated Learning.

S Fenanir, F Semchedine - Revue d'Intelligence Artificielle, 2023 - researchgate.net
With the proliferation of the Internet of Things (IoT) in various domains, concerns over
information security and user privacy have exponentially escalated. Numerous smart …

Design and development of an IoT application with visual analytics for water consumption monitoring

AC Tasong, RP Abao - Procedia Computer Science, 2019 - Elsevier
Water is imperative in the regular day to day existence of the human race. Household
people use water to sustain life. Nowadays, household people excessively use water …

A framework to apply the internet of things for medical care in a home environment

H Jita, V Pieterse - Proceedings of the 2018 International Conference on …, 2018 - dl.acm.org
The Internet of Things (IoT) is revolutionizing the way in which we do a number of things
including in-home medical care. An in-home care system that uses IoT technology offers a …

Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future

SF Ahmed, S Shuravi, A Bhuyian, S Afrin… - arXiv preprint arXiv …, 2023 - arxiv.org
Given the exponential expansion of the internet, the possibilities of security attacks and
cybercrimes have increased accordingly. However, poorly implemented security …

Cybersecurity in the automotive industry: a systematic literature review (SLR)

I Fernandez de Arroyabe, T Watson… - Journal of Computer …, 2023 - Taylor & Francis
This paper presents a systematic literature review (SLR) on cybersecurity in the automotive
industry. Using the R tool Bibliometrix, a total of 537 papers related to cybersecurity and the …

[HTML][HTML] Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives

MF Arroyabe, CFA Arranz, IF De Arroyabe… - Computers & …, 2024 - Elsevier
This paper investigates cybercrime in Small and Medium Enterprises (SMEs) using
Cyberspace Theory as a theoretical framework for a comprehensive analysis. Cyberspace …