Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective
G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …
devices act in concert, rarely requiring human intervention, posing significant challenges in …
A systematic survey: Security threats to UAV-aided IoT applications, taxonomy, current challenges and requirements with future research directions
Unmanned aerial vehicles (UAVs) as an intermediary can offer an efficient and useful
communication paradigm for different Internet of Things (IoT) applications. Following the …
communication paradigm for different Internet of Things (IoT) applications. Following the …
Hyperledger fabric blockchain for securing the edge internet of things
Providing security and privacy to the Internet of Things (IoT) networks while achieving it with
minimum performance requirements is an open research challenge. Blockchain technology …
minimum performance requirements is an open research challenge. Blockchain technology …
Technological transformation of telco operators towards seamless iot edge-cloud continuum
This article investigates and discusses challenges in the telecommunication field from
multiple perspectives, both academic and industry sides are catered for, surveying the main …
multiple perspectives, both academic and industry sides are catered for, surveying the main …
Hardware security for Internet of Things identity assurance
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …
prioritize their security, especially in the context of identity and authentication mechanisms …
A review of distributed access control for blockchain systems towards securing the internet of things
I Butun, P Österberg - IEEE Access, 2020 - ieeexplore.ieee.org
As the Internet of Things (IoT) paradigm gets more attention from academia and industry,
implementation tools of IoT will be explored more and more. One example is the applicability …
implementation tools of IoT will be explored more and more. One example is the applicability …
Enabling security services in socially assistive robot scenarios for healthcare applications
Today's IoT deployments are highly complex, heterogeneous and constantly changing. This
poses severe security challenges such as limited end-to-end security support, lack of cross …
poses severe security challenges such as limited end-to-end security support, lack of cross …
Intrinsic random optical features of the electronic packages as physical unclonable functions for internet of things security
Q Li, F Chen, J Kang, P Wang, J Su… - Advanced Photonics …, 2022 - Wiley Online Library
The increasing security threat is a serious challenge to the internet of things (IoT). Hardware‐
based security primitive is an essential and powerful way to protect IoT devices from various …
based security primitive is an essential and powerful way to protect IoT devices from various …
Ultrafast Near‐Ideal Phase‐Change Memristive Physical Unclonable Functions Driven by Amorphous State Variations
There is an ever‐increasing demand for next‐generation devices that do not require
passwords and are impervious to cloning. For traditional hardware security solutions in edge …
passwords and are impervious to cloning. For traditional hardware security solutions in edge …
Agile-AES: Implementation of configurable AES primitive with agile design approach
In the data-centric era, interconnected devices must be able to communicate efficiently and
securely with their hosts even over untrusted networks. This led to the adoption of several …
securely with their hosts even over untrusted networks. This led to the adoption of several …