Security and privacy in IoT: a survey

PM Chanal, MS Kakkasageri - Wireless Personal Communications, 2020 - Springer
Abstract The Internet of Things (IoT) is a network of globally connected physical objects,
which are associated with each other via Internet. The IoT foresees the interconnection of …

[HTML][HTML] Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends

A Khan, A Ahmad, M Ahmed, J Sessa… - Complex & Intelligent …, 2022 - Springer
Scalable and secure authorization of smart things is of the crucial essence for the successful
deployment of the Internet of Things (IoT). Unauthorized access to smart things could …

Detecting rogue attacks on commercial wireless Insteon home automation systems

CM Talbot, MA Temple, TJ Carbino, JA Betances - Computers & security, 2018 - Elsevier
Abstract The Internet of Things (IoT) and commercial wireless home automation applications
are expanding as technical capability evolves and implementation costs continue to …

Security and privacy issues in fog computing

A Ali, M Ahmed, M Imran… - Fog computing: Theory …, 2020 - Wiley Online Library
Fog computing is now becoming prominent among users due to its on‐demand services and
dynamic resource allocations. Resource allocation and scheduling is a critical task in cloud …

Survey on iot multi-factor authentication protocols: A systematic literature review

ZAAM Fneish, M El-Hajj… - 2023 11th International …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network of physical objects that is equipped with computers,
electronics, applications, sensors, and other devices. As the number of IoT devices and apps …

Cyber-physical systems security through multi-factor authentication and data analytics

L Vegh - 2018 IEEE International Conference on Industrial …, 2018 - ieeexplore.ieee.org
We are living in a society where technology is present everywhere we go. We are striving
towards smart homes, smart cities, Internet of Things, Internet of Everything. Not so long ago …

Securing zigbee commercial communications using constellation based distinct native attribute fingerprinting

CM Rondeau, JA Betances… - Security and …, 2018 - Wiley Online Library
This work provides development of Constellation Based DNA (CB‐DNA) Fingerprinting for
use in systems employing quadrature modulations and includes network protection …

Enhancing critical infrastructure and key resources (CIKR) level-0 physical process security using field device distinct native attribute features

J Lopez, NC Liefer, CR Busho… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The need for improved critical infrastructure and key resource security is unquestioned and
there has been minimal emphasis on level-0 (PHY process) improvements. Wired signal …

Review on authentication schemes for device security in lorawan

D Naidu, NK Ray - 2021 19th OITS International Conference on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is being seen as the ultra-modern technology with a wide scope of
research in its various aspects. A single compromised device can be turned malicious and …

[HTML][HTML] Ubiquitous control of a CNC machine: Proof of concept for industrial IoT applications

SA Aebersold, MO Akinsolu, S Monir, ML Jones - Information, 2021 - mdpi.com
In this paper, an integrated system to control and manage a state-of-the-art industrial
computer numerical control (CNC) machine (Studer S33) using a commercially available …