Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …
significant attention from the research community. To this end, several surveys were put …
State-of-the-art survey of artificial intelligent techniques for IoT security
TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …
innovation community's considerable attention. Several surveys have covered different IoT …
Internet of things: Evolution, concerns and security challenges
The escalated growth of the Internet of Things (IoT) has started to reform and reshape our
lives. The deployment of a large number of objects adhered to the internet has unlocked the …
lives. The deployment of a large number of objects adhered to the internet has unlocked the …
Towards blockchain-based auditable storage and sharing of IoT data
Today the cloud plays a central role in storing, processing, and distributing data. Despite
contributing to the rapid development of IoT applications, the current IoT cloud-centric …
contributing to the rapid development of IoT applications, the current IoT cloud-centric …
Waldo: A private time-series database from function secret sharing
Applications today rely on cloud databases for storing and querying time-series data. While
outsourcing storage is convenient, this data is often sensitive, making data breaches a …
outsourcing storage is convenient, this data is often sensitive, making data breaches a …
Blockchain mechanism and symmetric encryption in a wireless sensor network
AE Guerrero-Sanchez, EA Rivas-Araiza… - Sensors, 2020 - mdpi.com
The Internet of Things (IoT) paradigm allows the connection and exchange of information
between millions of smart devices. This paradigm grows and develops exponentially as do …
between millions of smart devices. This paradigm grows and develops exponentially as do …
CryptDICE: Distributed data protection system for secure cloud data storage and computation
Cloud storage allows organizations to store data at remote sites of service providers.
Although cloud storage services offer numerous benefits, they also involve new risks and …
Although cloud storage services offer numerous benefits, they also involve new risks and …
Secure sharing of partially homomorphic encrypted IoT data
IoT applications often utilize the cloud to store and provide ubiquitous access to collected
data. This naturally facilitates data sharing with third-party services and other users, but …
data. This naturally facilitates data sharing with third-party services and other users, but …
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data
Applications for document similarity detection are widespread in diverse communities,
including institutions and corporations. However, currently available detection systems fail to …
including institutions and corporations. However, currently available detection systems fail to …
{TVA}: A multi-party computation system for secure and expressive time series analytics
We present TVA, a multi-party computation (MPC) system for secure analytics on secret-
shared time series data. TVA achieves strong security guarantees in the semi-honest and …
shared time series data. TVA achieves strong security guarantees in the semi-honest and …