Smart environments with many Internet of Things (IoT) devices are at significant risk of cyberattacks, putting private data and personal safety in danger. While IoT device …
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected …
Abstract The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and …
IoT provides an environment which enables access to a plethora of different services. In order to reach these services, devices need to decide if the providers are trustable or not …
U Javaid, MN Aman, B Sikdar - … and Protocol Design for Mobile Networks …, 2020 - dl.acm.org
The constantly growing number of Internet of Things (IoT) devices and their resource- constrained nature makes them particularly vulnerable and increasingly attractive for …
Authorization, and more generally Trust Management (TM), is an indispensable part of the correct operation of most IT systems. The advent of the Internet of Things (IoT), with its cyber …
L Liu, Z Ma, W Meng - Future generation computer systems, 2019 - Elsevier
Abstract The Internet of Things (IoT) has experienced a rapid growth in the last few years allowing different Internet-enabled devices to interact with each other in various …
Y Alghofaili, MA Rassam - Sensors, 2023 - mdpi.com
The integration of the cloud and Internet of Things (IoT) technology has resulted in a significant rise in futuristic technology that ensures the long-term development of IoT …
Unidentified devices in a network can result in devastating consequences. It is, therefore, necessary to fingerprint and identify IoT devices connected to private or critical networks …