Model predictive control for demand flexibility: Real-world operation of a commercial building with photovoltaic and battery systems

K Zhang, A Prakash, L Paul, D Blum, P Alstone… - Advances in Applied …, 2022 - Elsevier
Hundreds of studies have investigated Model Predictive Control (MPC) for the optimal
operation of building energy systems in the past two decades. However, MPC field tests are …

Trust-based blockchain authorization for IoT

GD Putra, V Dedeoglu, SS Kanhere… - … on Network and …, 2021 - ieeexplore.ieee.org
Authorization or access control limits the actions a user may perform on a computer system,
based on predetermined access control policies, thus preventing access by illegitimate …

{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}

S Kumar, Y Hu, MP Andersen, RA Popa… - 28th USENIX security …, 2019 - usenix.org
As the Internet of Things (IoT) emerges over the next decade, developing secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …

XAuth: Efficient privacy-preserving cross-domain authentication

J Chen, Z Zhan, K He, R Du, D Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
It is well known that each Public Key Infrastructure (PKI) system forms a closed security
domain and only recognizes certificates in its own domain (such as medical systems …

Trust management in decentralized iot access control system

GD Putra, V Dedeoglu, SS Kanhere… - 2020 IEEE international …, 2020 - ieeexplore.ieee.org
Heterogeneous and dynamic IoT environments require a lightweight, scalable, and
trustworthy access control system for protection from unauthorized access and for automated …

Sok: data sovereignty

J Ernstberger, J Lauinger, F Elsheimy… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Society appears to be on the verge of recognizing the need for control over sensitive data in
modern web applications. Recently, many systems claim to give control to individuals …

Shattered Chain of Trust: Understanding Security Risks in {Cross-Cloud}{IoT} Access Delegation

B Yuan, Y Jia, L Xing, D Zhao, XF Wang… - 29th USENIX security …, 2020 - usenix.org
IoT clouds facilitate the communication between IoT devices and users, and authorize users'
access to their devices. In this paradigm, an IoT device is usually managed under a …

Merkle2: A Low-Latency Transparency Log System

Y Hu, K Hooshmand, H Kalidhindi… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Transparency logs are designed to help users audit untrusted servers. For example,
Certificate Transparency (CT) enables users to detect when a compromised Certificate …

Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things

H Zhong, C Gu, Q Zhang, J Cui, C Gu, D He - Ad Hoc Networks, 2023 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a key technology for building intelligent
manufacturing, optimizing industrial device management, and improving productivity …

Who's in control? On security risks of disjointed IoT device management channels

Y Jia, B Yuan, L Xing, D Zhao, Y Zhang… - Proceedings of the …, 2021 - dl.acm.org
An IoT device today can be managed through different channels, eg, by its device
manufacturer's app, or third-party channels such as Apple's Home app, or a smart speaker …