Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

Leveraging the internet of things and blockchain technology in supply chain management

A Rejeb, JG Keogh, H Treiblmaier - Future Internet, 2019 - mdpi.com
Modern supply chains have evolved into highly complex value networks and turned into a
vital source of competitive advantage. However, it has become increasingly challenging to …

Cyber resilience and incident response in smart cities: A systematic literature review

G Ahmadi-Assalemi, H Al-Khateeb, G Epiphaniou… - Smart Cities, 2020 - mdpi.com
The world is experiencing a rapid growth of smart cities accelerated by Industry 4.0,
including the Internet of Things (IoT), and enhanced by the application of emerging …

ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things

P Shukla - 2017 intelligent systems conference (IntelliSys), 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging business model aimed to connect many low-power
embedded devices with internet. IoT has many applications in building smart cities, smart …

Hybrid PLC/wireless communication for smart grids and internet of things applications

L de MBA Dib, V Fernandes… - IEEE internet of …, 2017 - ieeexplore.ieee.org
This paper outlines important characteristics of hybrid power line/wireless data
communication system for smart grid (SG) and Internet of Things (IoT) applications …

The influence of blockchains and internet of things on global value chain

A Egwuonwu, C Mordi, A Egwuonwu… - Strategic …, 2022 - Wiley Online Library
Despite the increasing proliferation of deploying the internet of things (IoT) in the global
value chain (GVC), several challenges might lead to a lack of trust among value chain …

Physically related functions: Exploiting related inputs of PUFs for authenticated-key exchange

D Chatterjee, H Boyapally, S Patranabis… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
This paper initiates the study of “Cryptophasia in Hardware”–a phenomenon that allows
hardware circuits/devices with no pre-established secret keys to securely exchange secret …

Understanding characteristics and system implications of DAG-based blockchain in IoT environments

T Wang, Q Wang, Z Shen, Z Jia… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Blockchain is starting to be deployed in the Internet of Things (IoT) to enable autonomous
device-to-device transactions. However, traditional block-based blockchain techniques …

Blockchain for IoT: The challenges and a way forward

I Makhdoom, M Abolhasan, W Ni - ICETE 2018-Proceedings of …, 2018 - opus.lib.uts.edu.au
Bitcoin has revolutionized the decentralized payment system by excluding the need for a
trusted third party, reducing the transaction (TX) fee and time involved in TX confirmation as …

[图书][B] Recent Trends in Blockchain for Information Systems Security and Privacy

AK Tyagi, A Abraham - 2021 - books.google.com
Blockchain technology is an emerging distributed, decentralized architecture and computing
paradigm, which has accelerated the development and application of cloud, fog and edge …