Model predictive control for demand flexibility: Real-world operation of a commercial building with photovoltaic and battery systems
Hundreds of studies have investigated Model Predictive Control (MPC) for the optimal
operation of building energy systems in the past two decades. However, MPC field tests are …
operation of building energy systems in the past two decades. However, MPC field tests are …
Trust-based blockchain authorization for IoT
Authorization or access control limits the actions a user may perform on a computer system,
based on predetermined access control policies, thus preventing access by illegitimate …
based on predetermined access control policies, thus preventing access by illegitimate …
{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}
As the Internet of Things (IoT) emerges over the next decade, developing secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …
XAuth: Efficient privacy-preserving cross-domain authentication
It is well known that each Public Key Infrastructure (PKI) system forms a closed security
domain and only recognizes certificates in its own domain (such as medical systems …
domain and only recognizes certificates in its own domain (such as medical systems …
Trust management in decentralized iot access control system
Heterogeneous and dynamic IoT environments require a lightweight, scalable, and
trustworthy access control system for protection from unauthorized access and for automated …
trustworthy access control system for protection from unauthorized access and for automated …
Sok: data sovereignty
Society appears to be on the verge of recognizing the need for control over sensitive data in
modern web applications. Recently, many systems claim to give control to individuals …
modern web applications. Recently, many systems claim to give control to individuals …
Shattered Chain of Trust: Understanding Security Risks in {Cross-Cloud}{IoT} Access Delegation
IoT clouds facilitate the communication between IoT devices and users, and authorize users'
access to their devices. In this paradigm, an IoT device is usually managed under a …
access to their devices. In this paradigm, an IoT device is usually managed under a …
Merkle2: A Low-Latency Transparency Log System
Y Hu, K Hooshmand, H Kalidhindi… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Transparency logs are designed to help users audit untrusted servers. For example,
Certificate Transparency (CT) enables users to detect when a compromised Certificate …
Certificate Transparency (CT) enables users to detect when a compromised Certificate …
Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things
Abstract Industrial Internet of Things (IIoT) is a key technology for building intelligent
manufacturing, optimizing industrial device management, and improving productivity …
manufacturing, optimizing industrial device management, and improving productivity …
Who's in control? On security risks of disjointed IoT device management channels
An IoT device today can be managed through different channels, eg, by its device
manufacturer's app, or third-party channels such as Apple's Home app, or a smart speaker …
manufacturer's app, or third-party channels such as Apple's Home app, or a smart speaker …