Internet of things security: A top-down survey

DE Kouicem, A Bouabdallah, H Lakhlef - Computer Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) is one of the promising technologies that has attracted a lot
of attention in both industrial and academic fields these years. It aims to integrate seamlessly …

The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved

W Zhou, Y Jia, A Peng, Y Zhang… - IEEE Internet of things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is an increasingly popular technology that enables physical devices,
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …

An efficient file hierarchy attribute-based encryption scheme in cloud computing

S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …

Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot

S Belguith, N Kaaniche, M Laurent, A Jemai, R Attia - Computer Networks, 2018 - Elsevier
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures
efficient data sharing among dynamic group of users. Nevertheless, this encryption …

Security and privacy in the industrial internet of things: Current standards and future challenges

T Gebremichael, LPI Ledwaba, MH Eldefrawy… - IEEE …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly becoming an integral component of the industrial
market in areas such as automation and analytics, giving rise to what is termed as the …

Comparison of attribute-based encryption schemes in securing healthcare systems

R Walid, KP Joshi, SG Choi - Scientific Reports, 2024 - nature.com
E-health has become a top priority for healthcare organizations focused on advancing
healthcare services. Thus, medical organizations have been widely adopting cloud services …

A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing

YS Rao - Future Generation Computer Systems, 2017 - Elsevier
Abstract In recent years, Personal Health Record (PHR) system has attracted intensive
attention due to its universal accessibility and low cost. The practical deployment of PHR …

[HTML][HTML] MLS-ABAC: Efficient multi-level security attribute-based access control scheme

SF Aghili, M Sedaghat, D Singelée, M Gupta - Future Generation Computer …, 2022 - Elsevier
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet
of Things, where various devices with low computational power and different security levels …

Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT

S Banerjee, B Bera, AK Das, S Chattopadhyay… - Computer …, 2021 - Elsevier
Abstract Recent advances in Low Power Wide Area Network (LPWAN) are expected to
augment the already prodigious proliferation of Industrial Internet of Things (IIoT). However …

A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT

S Ding, C Li, H Li - IEEE Access, 2018 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic
technique that integrates data encryption with access control for ensuring data security in IoT …