Industrial internet of things: Challenges, opportunities, and directions

E Sisinni, A Saifullah, S Han… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging domain that promises ubiquitous connection to the
Internet, turning common objects into connected devices. The IoT paradigm is changing the …

A review of security in internet of things

Y Harbi, Z Aliouat, S Harous, A Bentaleb… - Wireless Personal …, 2019 - Springer
Abstract Internet of Things (IoT) has drawn significant attention in recent years since it has
made revolutionary changes in human life. The IoT enables the exchange of information in a …

IoT security: ongoing challenges and research opportunities

ZK Zhang, MCY Cho, CW Wang… - 2014 IEEE 7th …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and
software to share and communicate information on the Internet. Given that the shared data …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …

Gestión de almacenes y tecnologías de la información y comunicación (TIC)

AAC Espinal, RAG Montoya, JAC Arenas - Estudios gerenciales, 2010 - Elsevier
Este artículo de revisión bibliográfica busca identificar el estado del arte y la utilización de
las Tecnologías de la Información y Comunicación (TIC) en la gestión de almacenes y su …

Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors

H Nili, GC Adam, B Hoskins, M Prezioso, J Kim… - Nature …, 2018 - nature.com
Hardware-intrinsic security primitives employ instance-specific and process-induced
variations in electronic hardware as a source of cryptographic data. Among various …

Emerging physical unclonable functions with nanotechnology

Y Gao, DC Ranasinghe, SF Al-Sarawi, O Kavehei… - IEEE …, 2016 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are increasingly used for authentication and
identification applications as well as the cryptographic key generation. An important feature …

NFC tags with proximity detection

IJ Forster - US Patent 9,767,329, 2017 - Google Patents
Systems, apparatuses and methods provide for detecting the proximate placement of an
external NFC reader to a specific location on a display surface. The display surface can be …

Breaking Grain-128 with dynamic cube attacks

I Dinur, A Shamir - Fast Software Encryption: 18th International Workshop …, 2011 - Springer
We present a new variant of cube attacks called a dynamic cube attack. Whereas standard
cube attacks [4] find the key by solving a system of linear equations in the key bits, the new …

[PDF][PDF] Security and privacy threats in IoT architectures.

D Kozlov, J Veijalainen, Y Ali - BODYNETS, 2012 - researchgate.net
In this paper, we describe an overall architecture for Internet of Things (IoT) and analyze the
known and new threats for the security, privacy and trust (SPT) at different levels of …