A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities

K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …

Industrial internet of things: Recent advances, enabling technologies and open challenges

WZ Khan, MH Rehman, HM Zangoti, MK Afzal… - Computers & electrical …, 2020 - Elsevier
The adoption of emerging technological trends and applications of the Internet of Things
(IoT) in the industrial systems is leading towards the development of Industrial IoT (IIoT). IIoT …

The use of MQTT in M2M and IoT systems: A survey

B Mishra, A Kertesz - Ieee Access, 2020 - ieeexplore.ieee.org
Nowadays billions of smart devices or things are present in Internet of Things (IoT)
environments, such as homes, hospitals, factories, and vehicles, all around the world. As a …

Machine learning in IoT security: Current solutions and future challenges

F Hussain, R Hussain, SA Hassan… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The future Internet of Things (IoT) will have a deep economical, commercial and social
impact on our lives. The participating nodes in IoT networks are usually resource …

[HTML][HTML] A survey on blockchain for industrial internet of things

RL Kumar, F Khan, S Kadry, S Rho - Alexandria Engineering Journal, 2022 - Elsevier
Blockchain and the Internet of Things (IoT) are separately regarded as highly capable
popular technologies. Blockchain is a database used for decentralized transaction …

Identification of malicious activities in industrial internet of things based on deep learning models

ALH Muna, N Moustafa, E Sitnikova - Journal of information security and …, 2018 - Elsevier
Abstract Internet Industrial Control Systems (IICSs) that connect technological appliances
and services with physical systems have become a new direction of research as they face …

Vulnerabilities and limitations of MQTT protocol used between IoT devices

D Dinculeană, X Cheng - Applied Sciences, 2019 - mdpi.com
With the proliferation of smart devices capable of communicating over a network using
different protocols, each year more and more successful attacks are recorded against these …

Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication

A Diro, H Reda, N Chilamkurti, A Mahmood… - IEEE …, 2020 - ieeexplore.ieee.org
The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a
significant challenge for securing IoT applications. This necessitates a robust and …

A secure publish/subscribe protocol for internet of things

L Malina, G Srivastava, P Dzurenda, J Hajny… - Proceedings of the 14th …, 2019 - dl.acm.org
The basic concept behind the emergence of Internet of Things (IoT) is to connect as many
objects to the Internet as possible in an attempt to make our lives better in some way …

A systematic security assessment and review of internet of things in the context of authentication

M Saqib, AH Moon - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …