Analysis of security issues and countermeasures for the industrial internet of things

S Pal, Z Jadidi - Applied Sciences, 2021 - mdpi.com
Industrial Internet of Things (IIoT) can be seen as an extension of the Internet of Things (IoT)
services and applications to industry with the inclusion of Industry 4.0 that provides …

A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …

Security, privacy and trust in Internet of Things: The road ahead

S Sicari, A Rizzardi, LA Grieco, A Coen-Porisini - Computer networks, 2015 - Elsevier
Abstract Internet of Things (IoT) is characterized by heterogeneous technologies, which
concur to the provisioning of innovative services in various application domains. In this …

Distributed interoperable records: The key to better supply chain management

A Henninger, A Mashatan - Computers, 2021 - mdpi.com
The global supply chain is a network of interconnected processes that create, use, and
exchange records, but which were not designed to interact with one another. As such, the …

A PUF-based modeling-attack resilient authentication protocol for IoT devices

M Ebrahimabadi, M Younis… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) offer a promising solution for the authentication of
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …

Analysis of authentication techniques in Internet of Things (IoT)

M El-Hajj, M Chamoun, A Fadlallah… - 2017 1st Cyber …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives,
with its applications ranging from smart homes, to wearable devices, to healthcare, etc. This …

Distributed network security framework of energy internet based on internet of things

J Zhang - Sustainable Energy Technologies and Assessments, 2021 - Elsevier
This paper considers that energy Internet is the future development direction of power
system, which solves the problems of clean energy compatibility and deep and efficient …

Taxonomy of authentication techniques in Internet of Things (IoT)

M El-Hajj, M Chamoun, A Fadlallah… - 2017 IEEE 15th …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives,
with applications ranging from smart homes, to wearable devices, to healthcare, etc. This …

Smart insiders: exploring the threat from insiders using the internet-of-things

JRC Nurse, A Erola, I Agrafiotis… - … Workshop on Secure …, 2015 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is set to be one of the most disruptive technology paradigms
since the advent of the Internet itself. Market research company Gartner estimates that …

A secure IoT-based authentication system in cloud computing environment

HL Wu, CC Chang, YZ Zheng, LS Chen, CC Chen - Sensors, 2020 - mdpi.com
The Internet of Things (IoT) is currently the most popular field in communication and
information techniques. However, designing a secure and reliable authentication scheme for …