Blockchain for IoT access control: Recent trends and future research directions

S Pal, A Dorri, R Jurdak - Journal of Network and Computer Applications, 2022 - Elsevier
With the rapid development of wireless sensor networks, smart devices, and traditional
information and communication technologies, there is tremendous growth in the use of …

[HTML][HTML] Internet of things in health: Requirements, issues, and gaps

J Calvillo-Arbizu, I Román-Martínez… - Computer Methods and …, 2021 - Elsevier
Abstract Background and Objectives: The Internet of Things (IoT) paradigm has been
extensively applied to several sectors in the last years, ranging from industry to smart cities …

[HTML][HTML] A survey of edge computing-based designs for IoT security

K Sha, TA Yang, W Wei, S Davari - Digital Communications and Networks, 2020 - Elsevier
Pervasive IoT applications enable us to perceive, analyze, control, and optimize the
traditional physical systems. Recently, security breaches in many IoT applications have …

On security challenges and open issues in Internet of Things

K Sha, W Wei, TA Yang, Z Wang, W Shi - Future generation computer …, 2018 - Elsevier
Abstract When Internet of Things (IoT) applications become a part of people's daily life,
security issues in IoT have caught significant attention in both academia and industry …

Security and privacy in the industrial internet of things: Current standards and future challenges

T Gebremichael, LPI Ledwaba, MH Eldefrawy… - IEEE …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly becoming an integral component of the industrial
market in areas such as automation and analytics, giving rise to what is termed as the …

[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

L Golightly, P Modesti, R Garcia, V Chang - Cyber Security and Applications, 2023 - Elsevier
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …

[HTML][HTML] Augmenting Zero Trust Network Architecture to enhance security in virtual power plants

A Alagappan, SK Venkatachary, LJB Andrews - Energy Reports, 2022 - Elsevier
Abstract Zero Trust Network Architecture implementation is gaining popularity in the ICT
sector to defend and deter cyber threats or cyber crime. Considering the architecture's …

[HTML][HTML] An attribute-based approach toward a secured smart-home IoT access control and a comparison with a role-based approach

S Ameer, J Benson, R Sandhu - Information, 2022 - mdpi.com
The area of smart homes is one of the most popular for deploying smart connected devices.
One of the most vulnerable aspects of smart homes is access control. Recent advances in …

[HTML][HTML] A blockchain-inspired attribute-based zero-trust access control model for IoT

SM Awan, MA Azad, J Arshad, U Waheed, T Sharif - Information, 2023 - mdpi.com
The connected or smart environment is the integration of smart devices (sensors, IoT
devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of …

Decision tree based user-centric security solution for critical IoT infrastructure

D Puthal, S Wilson, A Nanda, M Liu, S Swain… - Computers and …, 2022 - Elsevier
Data processing in real-time brings better business modeling and an intuitive plan of action.
Internet of things (IoT), being a source of sensitive data collected and communicated through …