Internet of things 2.0: Concepts, applications, and future directions
Applications and technologies of the Internet of Things are in high demand with the increase
of network devices. With the development of technologies such as 5G, machine learning …
of network devices. With the development of technologies such as 5G, machine learning …
[HTML][HTML] Security analysis of cyber physical system using digital forensic incident response
There is a great demand for an efficient security tool which can secure IIoT systems from
potential adversarial attacks. However, it is challenging to design a suitable security model …
potential adversarial attacks. However, it is challenging to design a suitable security model …
Blockchain assisted secure data sharing model for Internet of Things based smart industries
G Manogaran, M Alazab, PM Shakeel… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Industrial Internet of Things is focused to improve the performance of smart factories through
automation and scalable functions. IoT paradigm, information and communication …
automation and scalable functions. IoT paradigm, information and communication …
Anomaly detection for industrial control system based on autoencoder neural network
C Wang, B Wang, H Liu, H Qu - Wireless Communications and …, 2020 - Wiley Online Library
As the Industrial Internet of Things (IIoT) develops rapidly, cloud computing and fog
computing become effective measures to solve some problems, eg, limited computing …
computing become effective measures to solve some problems, eg, limited computing …
Secure Internet of Things (IoT)-based smart-world critical infrastructures: Survey, case study and research opportunities
The widespread adoption of the Internet of Things (IoT) technologies has drastically
increased the breadth and depth of attack surfaces in networked systems, providing new …
increased the breadth and depth of attack surfaces in networked systems, providing new …
Secureiiot environment: Federated learning empowered approach for securing iiot from data breach
The growing congruence of gadgets today resulted in a numerous type of cyber attacks. A
similar trend occurs with the industrial Internet of Things (IIoT), wherein increasing data …
similar trend occurs with the industrial Internet of Things (IIoT), wherein increasing data …
A robust deep-learning-enabled trust-boundary protection for adversarial industrial IoT environment
In recent years, trust-boundary protection has become a challenging problem in Industrial
Internet of Things (IIoT) environments. Trust boundaries separate IIoT processes and data …
Internet of Things (IIoT) environments. Trust boundaries separate IIoT processes and data …
[HTML][HTML] An edge-computing based Industrial Gateway for Industry 4.0 using ARM TrustZone technology
S Gupta - Journal of Industrial Information Integration, 2023 - Elsevier
Secure and efficient communication to establish a seamless nexus between the five levels of
a typical automation pyramid is paramount to Industry 4.0. Specifically, vertical and …
a typical automation pyramid is paramount to Industry 4.0. Specifically, vertical and …
Security analysis of network anomalies mitigation schemes in IoT networks
The Internet of Things (IoT) is on the rise and it is giving a new shape to several fields such
as smart cities, smart homes, smart health, etc. as it facilitates the connection of physical …
as smart cities, smart homes, smart health, etc. as it facilitates the connection of physical …
5G network slice isolation with WireGuard and open source MANO: A VPNaaS proof-of-concept
S Haga, A Esmaeily, K Kralevska… - 2020 IEEE Conference …, 2020 - ieeexplore.ieee.org
The fifth-generation (5G) mobile networks aim to host different types of services on the same
physical infrastructure. Network slicing is considered as the key enabler for achieving this …
physical infrastructure. Network slicing is considered as the key enabler for achieving this …