[HTML][HTML] Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects

U Inayat, MF Zia, S Mahmood, HM Khalid… - Electronics, 2022 - mdpi.com
Internet of Things (IoT) is a developing technology that provides the simplicity and benefits of
exchanging data with other devices using the cloud or wireless networks. However, the …

Suitability analysis of consensus protocols for blockchain-based applications in the construction industry

Y Xu, X Tao, M Das, HHL Kwok, H Liu, G Wang… - Automation in …, 2023 - Elsevier
Blockchain technology has gained increasing attention in the construction sector. The
process of developing a blockchain-based application that fits user requirements largely …

A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds

C Ge, W Susilo, J Baek, Z Liu, J Xia… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …

User-level privacy-preserving federated learning: Analysis and performance optimization

K Wei, J Li, M Ding, C Ma, H Su… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Federated learning (FL), as a type of collaborative machine learning framework, is capable
of preserving private data from mobile terminals (MTs) while training the data into useful …

BSMD: A blockchain-based secure storage mechanism for big spatio-temporal data

Y Ren, D Huang, W Wang, X Yu - Future Generation Computer Systems, 2023 - Elsevier
As more and more mobile devices and IoT terminals are connected to the Internet, a huge
amount of spatio-temporal data is generated. In order to cope with the pressure of storing …

Data security storage mechanism based on blockchain industrial Internet of Things

J Wang, J Chen, Y Ren, PK Sharma, O Alfarraj… - Computers & Industrial …, 2022 - Elsevier
In the age of Industry 5.0, the industrial Internet of Things (IIoT) system has changed from the
original “cyber-physical” system to a complex “human-cyber-physical” system, data security …

An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services

JA Onesimu, J Karthikeyan, Y Sei - Peer-to-Peer Networking and …, 2021 - Springer
The healthcare services industry has seen a huge transformation since the prominent rise of
the Internet of Things (IoT). IoT in healthcare services includes a large number of unified and …

Identity-based broadcast proxy re-encryption for flexible data sharing in VANETs

J Zhang, S Su, H Zhong, J Cui… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Data sharing is an integral part of vehicular ad hoc networks (VANETs), which provide
drivers with safe and comfortable driving environments. However, when data are shared …

Toward secure distributed data storage with error locating in blockchain enabled edge computing

D Liu, Y Zhang, D Jia, Q Zhang, X Zhao… - Computer Standards & …, 2022 - Elsevier
The technique of Internet of things (IoT) connects the distributed devices via the network that
can realize smart applications, such as intelligent transportation, intelligent manufacturing …

Machine learning approach using artificial neural networks to detect malicious nodes in IoT networks

KKS Liyakat - International Conference on Machine Learning, IoT …, 2023 - Springer
Devices can now effortlessly and wirelessly share data with one another over the internet or
other networked systems thanks to a relatively new technology called Internet of Things …