A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

A Survey on Life-Cycle-Oriented Certificate Management in Industrial Networking Environments

J Göppert, A Walz, A Sikora - Journal of Sensor and Actuator Networks, 2024 - mdpi.com
Driven by the Industry 4.0 paradigm and the resulting demand for connectivity in industrial
networking, there is a convergence of formerly isolated operational technology and …

[HTML][HTML] A privacy-preserving attribute-based framework for IoT identity lifecycle management

J García-Rodríguez, A Skarmeta - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) has brought a new era of interconnected devices and
seamless data exchange. As the IoT ecosystem continues to expand, there is an increasing …

Building IPv6 addressing scheme using Hybrid Duplicate Address Detection to prevent Denial of Service Attack

A Gankotiya, V Kumar, KS Vaisla - Computers and Electrical Engineering, 2024 - Elsevier
Abstract Internet Protocol version 6 (IPv6) address configuration is needed to meet the
needs of current portable devices and wearable applications, where each device needs its …

IMF-PR: an improved Morton-filter-based pseudonym-revocation scheme in VANETs

C Zhao, J Qi, T Gao, X Deng - Sensors, 2023 - mdpi.com
Vehicle ad hoc networks (VANETs) are special wireless networks which help vehicles to
obtain continuous and stable communication. Pseudonym revocation, as a vital security …

Secure smart city application using webservice model and mayfly optimization‐based lightweight CNN

A Sheeba, R Rajalakshmi… - Transactions on …, 2024 - Wiley Online Library
IoT infrastructures and web services have primarily been deployed in sustainable smart
cities and societies. Users are highly attracted to the personalized web services by the IoT …

AutoPKI: public key infrastructure for IoT with automated trust transfer

J Höglund, S Bouget, M Furuhed… - International Journal of …, 2024 - Springer
IoT deployments grow in numbers and size, which makes questions of long-term support
and maintainability increasingly important. Without scalable and standard-compliant …

Challenges and Solutions in Integrating Narrowband IoT with Edge Computing: Resource Constraints, Security, Latency, and IDS Deployment

W Hendricks, B Kabaso - International Conference on Advanced …, 2023 - Springer
This study aimed to explore the integration of narrowband Internet of Things (NB-IoT) with
edge computing. The study examined existing literature regarding the resource constraints …

[PDF][PDF] Methods for Requirements Engineering, Verification, Security, Safety, and Robustness in AIoT Systems

M Pasin, J Ménétrey, P Felber… - Shaping the Future of …, 2024 - library.oapen.org
This chapter presents methods for requirements engineering, verification, security, safety,
and robustness with a special focus on AIoT systems. It covers an architectural framework …

Enabling Scalable Security in Internet of Things

Z He - 2023 - diva-portal.org
The popular notion of Internet of Things (IoT) implies two salient features: 1. a diversity of
small things, ie, constrained devices; 2. their seamless integration with the Internet …