The blockchain: State-of-the-art and research challenges

Y Lu - Journal of Industrial Information Integration, 2019 - Elsevier
The blockchain revolutionizes the creation of both scalable information technology systems
and diversified applications by integrating the increasingly popular artificial intelligence …

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

IoT and AI for smart government: A research agenda

A Kankanhalli, Y Charalabidis, S Mellouli - Government Information …, 2019 - Elsevier
Abstract The Internet of things (IoT) is the network of objects/things that contain electronics,
software, sensors, and actuators, which allows these things to connect, interact, and …

Challenges for adopting and implementing IoT in smart cities: An integrated MICMAC-ISM approach

M Janssen, S Luthra, S Mangla, NP Rana… - Internet …, 2019 - emerald.com
Purpose The wider use of Internet of Things (IoT) makes it possible to create smart cities.
The purpose of this paper is to identify key IoT challenges and understand the relationship …

Internet of Things: information security challenges and solutions

N Miloslavskaya, A Tolstoy - Cluster Computing, 2019 - Springer
Keeping up with the burgeoning Internet of Things (IoT) requires staying up to date on the
latest network attack trends in dynamic and complicated cyberspace, and take them into …

Enforcing security in Internet of Things frameworks: A systematic literature review

M Aly, F Khomh, M Haoues, A Quintero, S Yacout - Internet of Things, 2019 - Elsevier
With the rise of the Internet of Things (IoT) technology, the number of IoT devices/sensors
has increased significantly. It is anticipated that large-scale sensor-based systems will …

Leveraging user-related internet of things for continuous authentication: A survey

L Gonzalez-Manzano, JMD Fuentes… - ACM Computing Surveys …, 2019 - dl.acm.org
Among all Internet of Things (IoT) devices, a subset of them are related to users. Leveraging
these user-related IoT elements, it is possible to ensure the identity of the user for a period of …

Secure industrial Internet of Things critical infrastructure node design

JM Mcginthy, AJ Michaels - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Integration of industrial Internet of Things (IIoT) into critical infrastructures (CIs) is aiming to
improve efficiency in many crucial areas. The positive benefits of IIoT are increasing the …

Revisiting Industry 4.0: A new definition

A Ojra - Intelligent Computing: Proceedings of the 2018 …, 2019 - Springer
Growing significance of big data in modern industry is becoming a serious challenge.
Manufacturing stores data more than any other sector. Therefore, Industry 4.0 is introduced …

A survey on security threats and solutions in the age of IoT

C Atac, S Akleylek - Avrupa Bilim ve Teknoloji Dergisi, 2019 - dergipark.org.tr
Internet of Things (IoT) is rapidly developing and glamorous technology in which machines
and devices are connected and interacted with each other via Internet anywhere anytime …