Internet of things 2.0: Concepts, applications, and future directions

I Zhou, I Makhdoom, N Shariati, MA Raza… - IEEE …, 2021 - ieeexplore.ieee.org
Applications and technologies of the Internet of Things are in high demand with the increase
of network devices. With the development of technologies such as 5G, machine learning …

[HTML][HTML] Security analysis of cyber physical system using digital forensic incident response

P Binnar, S Bhirud, F Kazi - Cyber Security and Applications, 2024 - Elsevier
There is a great demand for an efficient security tool which can secure IIoT systems from
potential adversarial attacks. However, it is challenging to design a suitable security model …

Blockchain assisted secure data sharing model for Internet of Things based smart industries

G Manogaran, M Alazab, PM Shakeel… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Industrial Internet of Things is focused to improve the performance of smart factories through
automation and scalable functions. IoT paradigm, information and communication …

Anomaly detection for industrial control system based on autoencoder neural network

C Wang, B Wang, H Liu, H Qu - Wireless Communications and …, 2020 - Wiley Online Library
As the Industrial Internet of Things (IIoT) develops rapidly, cloud computing and fog
computing become effective measures to solve some problems, eg, limited computing …

Secure Internet of Things (IoT)-based smart-world critical infrastructures: Survey, case study and research opportunities

X Liu, C Qian, WG Hatcher, H Xu, W Liao, W Yu - IEEE Access, 2019 - ieeexplore.ieee.org
The widespread adoption of the Internet of Things (IoT) technologies has drastically
increased the breadth and depth of attack surfaces in networked systems, providing new …

Secureiiot environment: Federated learning empowered approach for securing iiot from data breach

A Makkar, TW Kim, AK Singh, J Kang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The growing congruence of gadgets today resulted in a numerous type of cyber attacks. A
similar trend occurs with the industrial Internet of Things (IIoT), wherein increasing data …

A robust deep-learning-enabled trust-boundary protection for adversarial industrial IoT environment

MM Hassan, MR Hassan, S Huda… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
In recent years, trust-boundary protection has become a challenging problem in Industrial
Internet of Things (IIoT) environments. Trust boundaries separate IIoT processes and data …

[HTML][HTML] An edge-computing based Industrial Gateway for Industry 4.0 using ARM TrustZone technology

S Gupta - Journal of Industrial Information Integration, 2023 - Elsevier
Secure and efficient communication to establish a seamless nexus between the five levels of
a typical automation pyramid is paramount to Industry 4.0. Specifically, vertical and …

Security analysis of network anomalies mitigation schemes in IoT networks

MA Lawal, RA Shaikh, SR Hassan - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is on the rise and it is giving a new shape to several fields such
as smart cities, smart homes, smart health, etc. as it facilitates the connection of physical …

5G network slice isolation with WireGuard and open source MANO: A VPNaaS proof-of-concept

S Haga, A Esmaeily, K Kralevska… - 2020 IEEE Conference …, 2020 - ieeexplore.ieee.org
The fifth-generation (5G) mobile networks aim to host different types of services on the same
physical infrastructure. Network slicing is considered as the key enabler for achieving this …