A probabilistic model checking (PMC) approach to solve security issues in digital twin (DT)

E Shaikh, N Mohammad, A Al-Ali… - … on Intelligent Data …, 2023 - ieeexplore.ieee.org
Recent years have observed a major rise in the utilization of Digital Twin (DT) technology. In
general, a DT is described as a digital counterpart of a given physical entity that is obtained …

Decentralized IoT Data Authentication with Signature Aggregation

J Bojič Burgos, M Pustišek - Sensors, 2024 - mdpi.com
The rapid expansion of the Internet of Things (IoT) has introduced significant challenges in
data authentication, necessitating a balance between scalability and security. Traditional …

Ensuring the integrity, confidentiality, and availability of IoT data in Industry 5.0: A Systematic Mapping Study

K Boisrond, PM Tardif, F Jaafar - IEEE Access, 2024 - ieeexplore.ieee.org
The significant success of the Internet of Things in facilitating connections among consumer
devices has led to an evident inclination towards connecting devices within industrial …

[PDF][PDF] Privacy-preserving authentication and key exchange mechanisms in internet of things applications

G Singh - 2021 - researchgate.net
Research Area: The Internet of Things (IoT) technology has emerged as the leader in
simplifying lives. The IoT is rapidly adopted by the various industries for faster data …

[图书][B] Secure collaborations for the industrial Internet of Things

J Pennekamp, K Wehrle, F Kerschbaum - 2024 - jpennekamp.de
Abstract The Industrial Internet of Things (IIoT) is leading to increasingly-interconnected and
networked industrial processes and environments, which, in turn, results in stakeholders …

Evaluation on the impact of cache parameter selection in access-driven cache attacks

P Guo, Y Yan, B Ye, C Zhu, L Zhang, T Shen, L Chen - Electronics, 2022 - mdpi.com
Cache attacks exploit the hardware vulnerabilities inherent to modern processors and pose
a new threat to Internet of Things (IoT) devices. Intuitively, different cache parameter …

High-efficiency PCSK-CFFH system design for IoT networks

X Yang, J An, Z Song, S Luo… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) brings opportunities for innovation and upgrading to
industrial production, but meanwhile, it poses unprecedented challenges on the physical …

A heterogeneous redundant architecture for industrial control system security

Z Dai, M Leeke, Y Ding, S Yang - 2022 IEEE 27th Pacific Rim …, 2022 - ieeexplore.ieee.org
Component-level heterogeneous redundancy is gaining popularity as an approach for
preventing single-point security breaches in Industrial Control Systems (ICSs), especially …

IoT cybersecurity threats mitigation via integrated technical and non-technical solutions

HS Al-Sibai, T Alrubaie… - International Journal of …, 2021 - inderscienceonline.com
With the growing number of connected devices to the internet every day, and the rapid
development and deployment of internet of things (IoT), the number of security threats and …

Data Security and Privacy in Industrial IoT

N Sharghivand, F Derakhshan - AI-Enabled Threat Detection and Security …, 2021 - Springer
Today, the integration of Industry 4.0 and IoT has opened up new opportunities for
generation, processing, and sharing vast amounts of data inside the industrial plants …