Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure

H Riggs, S Tufail, I Parvez, M Tariq, MA Khan, A Amir… - Sensors, 2023 - mdpi.com
Several critical infrastructures are integrating information technology into their operations,
and as a result, the cyber attack surface extends over a broad range of these infrastructures …

Group Key Management in Internet of Things: A Systematic Literature Review

F Samiullah, ML Gan, S Akleylek, Y Aun - IEEE Access, 2023 - ieeexplore.ieee.org
IoT networks are gaining popularity in terms of group networks built by sensor nodes and
other IoT-related devices. The significance of cryptography protocols for secure …

Incremental Threshold Scheme Enabled IoT Group Key Management

M Li, SC Hollifield… - 2023 7th Cyber Security in …, 2023 - ieeexplore.ieee.org
Cyber landscape evolves rapidly. Internet of Things (IoT) and Edge Computing (EC) have
rapidly become an integral part of the modern computing infrastructure. It is expected that …