Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions

W Li, W Meng, LF Kwok - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …

Towards multiple-mix-attack detection via consensus-based trust management in IoT networks

Z Ma, L Liu, W Meng - Computers & Security, 2020 - Elsevier
With the rapid development of Internet of Things (IoT), various smart devices can work
collaboratively and construct a kind of multihop IoT network. However, due to the distributed …

MidSiot: A multistage intrusion detection system for internet of things

N Dat-Thinh, H Xuan-Ninh… - … and Mobile Computing, 2022 - Wiley Online Library
Internet of Things (IoT) has been thriving in recent years, playing an important role in a
multitude of various domains, including industry 4.0, smart transportation, home automation …

Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities

W Meng, W Li, S Tug, J Tan - Journal of parallel and distributed computing, 2020 - Elsevier
With the increasing viability of Internet of Things (IoT), more devices are expected to be
connected in a smart city environment. It can provide many benefits for people's daily life, but …

Toward a blockchain-based framework for challenge-based collaborative intrusion detection

W Li, Y Wang, J Li, MH Au - International Journal of Information Security, 2021 - Springer
Network intrusions are a big threat to network and system assets, which have become more
complex to date. To enhance the detection performance, collaborative intrusion detection …

Detection and blockchain‐based collaborative mitigation of internet of things botnets

SM Sajjad, MR Mufti, M Yousaf, W Aslam… - Wireless …, 2022 - Wiley Online Library
DDoS (distributed denial of service) attacks have drastically effected the functioning of
Internet‐based services in recent years. Following the release of the Mirai botnet source …

eMUD: Enhanced manufacturer usage description for IoT botnets prevention on home WiFi routers

SM Sajjad, M Yousaf, H Afzal, MR Mufti - IEEE Access, 2020 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks have caused significant disruptions in the
operations of Internet-based services. These DDoS attacks use large scale botnets, which …

Blockchain technology with its application in medical and healthcare systems: A survey

BB Gupta, Mamta, R Mehla, W Alhalabi… - … Journal of Intelligent …, 2022 - Wiley Online Library
With the advent of the 21st century, healthcare systems all around the world are facing
challenges at an unprecedented scale. The recent covid‐19 outbreak is a glaring example …

Smart contract watermarking based on code obfuscation

T Huang, J Huang, Y Pang, H Yan - Information Sciences, 2023 - Elsevier
Most blockchains are entirely open-source software. This gives auditors ability to review the
security of cryptocurrencies such as Bitcoin. Because only after the source code of the …

Distributed secure edge computing architecture based on blockchain for real-time data integrity in IoT environments

R Xu, L Hang, W Jin, D Kim - Actuators, 2021 - mdpi.com
The traditional cloud-based Internet of Things (IoT) architecture places extremely high
demands on computers and storage on cloud servers. At the same time, the strong …