[HTML][HTML] Understanding cybersecurity frameworks and information security standards—a review and comprehensive overview

H Taherdoost - Electronics, 2022 - mdpi.com
Businesses are reliant on data to survive in the competitive market, and data is constantly in
danger of loss or theft. Loss of valuable data leads to negative consequences for both …

Security and privacy for low power iot devices on 5g and beyond networks: Challenges and future directions

J Cook, SU Rehman, MA Khan - IEEE Access, 2023 - ieeexplore.ieee.org
The growth in the use of small sensor devices, commonly known as the Internet of Things
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …

Statistical analysis of remote health monitoring based IoT security models & deployments from a pragmatic perspective

K Ashok, S Gopikrishnan - IEEE Access, 2023 - ieeexplore.ieee.org
Remote health monitoring-based Internet of Things (IoT) network security is a multi-domain
task, that involves identification of network attack, evaluation of mitigation strategies, design …

[HTML][HTML] Enabling secure data exchange through the iota tangle for iot constrained devices

A Carelli, A Palmieri, A Vilei, F Castanier, A Vesco - Sensors, 2022 - mdpi.com
Internet-of-Things (IoT) and sensor technologies have enabled the collection of data in a
distributed fashion for analysis and evidence-based decision making. However, security …

The “cyber security via determinism” paradigm for a quantum safe zero trust deterministic internet of things (IoT)

TH Szymanski - IEEE Access, 2022 - ieeexplore.ieee.org
The next-generation Internet of Things (IoT) will control the critical infrastructure of the 21st
century, including the Smart Power Grid and Smart Cities. It will also support Deterministic …

[HTML][HTML] Risk Assessment of Heterogeneous IoMT Devices: A Review

B Shanmugam, S Azam - Technologies, 2023 - mdpi.com
The adaptation of the Internet of Medical Things (IoMT) has provided efficient and timely
services and has transformed the healthcare industry to a great extent. Monitoring patients …

[HTML][HTML] A cyber-physical risk assessment approach for Internet of Things enabled transportation infrastructure

K Ntafloukas, DP McCrum, L Pasquale - Applied Sciences, 2022 - mdpi.com
Featured Application Cyber and physical security of transportation infrastructure. Abstract A
critical transportation infrastructure integrated with the Internet of Things based wireless …

Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope

ZA Sheikh, Y Singh, PK Singh, KZ Ghafoor - Computer Communications, 2022 - Elsevier
Abstract Cyber–Physical Systems (CPS) are developed by the integration of computational
algorithms and physical components and they exist as a result of technological …

EU cybersecurity act and IoT certification: landscape, perspective and a proposed template Scheme

A Khurshid, R Alsaaidi, M Aslam, S Raza - IEEE Access, 2022 - ieeexplore.ieee.org
The vulnerabilities in deployed IoT devices are a threat to critical infrastructure and user
privacy. There is ample ongoing research and efforts to produce devices that are secure-by …

[HTML][HTML] A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the blockchain

H Pourrahmani, A Yavarinasab, AMH Monazzah… - Internet of Things, 2023 - Elsevier
The current advances in the Internet of Things (IoT) and the solutions being offered by this
technology have accounted IoT among the top ten technologies that will transform the global …