Security concepts in emerging 6G communication: Threats, countermeasures, authentication techniques and research directions

SHA Kazmi, R Hassan, F Qamar, K Nisar, AAA Ibrahim - Symmetry, 2023 - mdpi.com
Challenges faced in network security have significantly steered the deployment timeline of
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …

Blockchained federated learning for internet of things: A comprehensive survey

Y Jiang, B Ma, X Wang, G Yu, P Yu, Z Wang… - ACM Computing …, 2024 - dl.acm.org
The demand for intelligent industries and smart services based on big data is rising rapidly
with the increasing digitization and intelligence of the modern world. This survey …

[PDF][PDF] Digital transformation metrics: a conceptual view

A Ahmad, M Alshurideh, B Al Kurdi… - … and Decision Sciences, 2021 - academia.edu
This research makes a major contribution to the current body of digital transformation
knowledge. Firstly, develop a comprehensive understanding of the required distributions …

A time-efficient approach toward DDoS attack detection in IoT network using SDN

J Bhayo, R Jafaq, A Ahmed, S Hameed… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
As the usability of Internet of Things (IoT) devices increases, the security threats and
vulnerabilities associated with these resource-constrained IoT devices also rise. One of the …

[PDF][PDF] A machine learning based IoT for providing an intrusion detection system for security.

DJ Atul, R Kamalraj, G Ramesh… - Microprocess …, 2021 - e-tarjome.com
Digital communication is provided with an effective communication platform to share and
transfer information. The emergence of the Cyber-Physical System (CPS) is a platform …

Cybersecurity model based on hardening for secure internet of things implementation

A Echeverría, C Cevallos, I Ortiz-Garces, RO Andrade - Applied Sciences, 2021 - mdpi.com
The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids,
and other smart concepts has driven data-driven decision making by managers and …

Ten GIS-based solutions for managing and controlling COVID-19 pandemic outbreak

NN Samany, H Liu, R Aghataher, M Bayat - SN computer science, 2022 - Springer
Abstract The coronavirus (COVID-19) pandemic has caused disastrous results in most
countries of the world. It has rapidly spread across the globe with over 156 million …

Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices

N Yasmin, R Gupta - International Journal of Information Technology, 2024 - Springer
The internet of things (IoT) ensures flexible network services to the end devices connected to
it. Although security has always been a concern for such networks. There are several …

Threat Modeling for Communication Security of IoT-Enabled Digital Logistics

AK Junejo, M Breza, JA McCann - Sensors, 2023 - mdpi.com
The modernization of logistics through the use of Wireless Sensor Network (WSN) Internet of
Things (IoT) devices promises great efficiencies. Sensor devices can provide real-time or …

A new method for vulnerability and risk assessment of IoT

F Arat, S Akleylek - Computer Networks, 2023 - Elsevier
In this paper, we propose a generic vulnerability and risk assessment method for IoT-
enabled systems. The main aim is to provide risk detection and vulnerability assessment for …