A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities

K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …

Current research on Internet of Things (IoT) security: A survey

WH Hassan - Computer networks, 2019 - Elsevier
The results of IoT failures can be severe, therefore, the study and research in security issues
in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy …

A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care

M Masud, GS Gaba, S Alqahtani… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …

Security for internet of things: A state of the art on existing protocols and open research issues

C Mahmoud, S Aouag - Proceedings of the 9th international conference …, 2019 - dl.acm.org
Internet of Things (IoT) consists of devices, smart objects, and people that are given a
unique identifier connected to the internet via wireless network. These devices are usually …

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …

[HTML][HTML] Leveraging blockchain for ensuring trust in IoT: A survey

R Kumar, R Sharma - Journal of King Saud University-Computer and …, 2022 - Elsevier
Abstract Internet of Things (IoT) refers to a technology where computing devices are
connected and form a network. IoT faces many security and privacy issues due to less …

AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment

M Wazid, P Bagga, AK Das, S Shetty… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart
transportation that takes intelligent commitments to the passengers to improve traffic safety …

Deep reinforcement learning for resource protection and real-time detection in IoT environment

W Liang, W Huang, J Long, K Zhang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
With the fast advancements of electronic chip technologies in the Internet of Things (IoT), it is
urgent to address the copyright protection issue of intellectual property (IP) circuit resources …

[HTML][HTML] A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey

Z Alavikia, M Shabro - Digital Communications and Networks, 2022 - Elsevier
The current power grid confronts severe challenges in satisfying customers' demands. Fast
transition to the much more flexible power grid enriched with renewable energies, micro …

Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment

S Jangirala, AK Das… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Secure real-time data about goods in transit in supply chains needs bandwidth having
capacity that is not fulfilled with the current infrastructure. Hence, 5G-enabled Internet of …