A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues

M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Today is the era of the Internet of Things (IoT). The recent advances in hardware and
information technology have accelerated the deployment of billions of interconnected, smart …

Biometrics for internet-of-things security: A review

W Yang, S Wang, NM Sahri, NM Karie, M Ahmed… - Sensors, 2021 - mdpi.com
The large number of Internet-of-Things (IoT) devices that need interaction between smart
devices and consumers makes security critical to an IoT environment. Biometrics offers an …

An authenticated key exchange protocol for multi-server architecture in 5G networks

TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar… - IEEE …, 2020 - ieeexplore.ieee.org
Currently, the popularity of the Internet of Things (IoT) has brought about an increase in the
amount of data, so multi-server distributed cloud computing has been widely used in various …

Threats and corrective measures for IoT security with observance of cybercrime: A survey

S Rani, A Kataria, V Sharma, S Ghosh… - Wireless …, 2021 - Wiley Online Library
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality
and comfort. IoT has contributed significantly to numerous application areas. The stormy …

Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems

AK Sutrala, MS Obaidat, S Saha, AK Das… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
With the tremendous growth of Information and Communications Technology (ICT), Cyber
Physical Systems (CPS) have opened the door for many potential applications ranging from …

Analyzing the impact of social networks and social behavior on electronic business during COVID-19 pandemic

C Luo - Information Processing & Management, 2021 - Elsevier
The Covid-19 pandemic caused substantial changes, particularly concerning marketing,
which led to high digital use. Social networking enables people to communicate easily with …

Routing and collision avoidance techniques for unmanned aerial vehicles: Analysis, optimal solutions, and future directions

B Sharma, MS Obaidat, V Sharma… - International Journal of …, 2020 - Wiley Online Library
Routing remains the most important problem to be explored, for discovering an ideal
pathway in unmanned aerial vehicles (UAVs). Several problems for identifying and targeting …

Edge computing based healthcare systems: Enabling decentralized health monitoring in Internet of medical Things

P Dong, Z Ning, MS Obaidat, X Jiang, Y Guo… - IEEE …, 2020 - ieeexplore.ieee.org
The rapid development of IoMT facilitates pervasive healthcare networks. However,
numerous MUs lead to deficient wireless channel and computation resources. Edge …

A provably secure and lightweight identity-based two-party authenticated key agreement protocol for IIoT environments

DS Gupta, SKH Islam, MS Obaidat… - IEEE Systems …, 2020 - ieeexplore.ieee.org
With the significant development of the Internet, Internet of Things (IoT) has become an
emerging technology in many industries. To support security and privacy in the Industrial IoT …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …