In order for the Internet of things to facilitate information sharing, the technology needs trustworthy mechanisms to ensure safe communications and reliable interactions. Recently …
J Xu, S Wang, A Zhou, F Yang - China Communications, 2020 - ieeexplore.ieee.org
Nowadays scalable IoT management is a bottleneck of IoT development due to the geographically dispersed distribution, fragmented ownerships, and ever-growing population …
Authorization or access control limits the actions a user may perform on a computer system, based on predetermined access control policies, thus preventing access by illegitimate …
H Yang, B Bao, C Li, Q Yao, A Yu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The integration of Internet of Things (IoT) and industry reveals the industrial manufacturing developments, resulting in Industry IoT (IIoT), which is to provide a general interconnect …
G Li, M Dong, LT Yang, K Ota, J Wu… - ieee transactions on …, 2020 - ieeexplore.ieee.org
Edge computational intelligence, integrating artificial intelligence (AI) and edge computing into Internet of Things (IoT), will generate many scattered knowledge. To enable auditable …
Establishing service-driven IoT systems that are reliable, efficient, and stable requires building trusted IoT environments to reduce catastrophic and unforeseen damages. Hence …
Recent research has focused on applying blockchain technology to solve security-related problems in Internet of Things (IoT) networks. However, implementing blockchain …
Internet of Things (IoT) is bringing a revolution in today's world where devices in our surroundings become smart and perform daily-life activities and operations with more …
H Wang, T Wang, L Shi, N Liu, S Zhang - Computer Networks, 2023 - Elsevier
The security of the Internet of Battlefield Things (IoBT) is greatly challenged by malicious intrusions from external environments. To protect IoBT from such intrusions, it is crucial to …