Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends

A Khan, A Ahmad, M Ahmed, J Sessa… - Complex & Intelligent …, 2022 - Springer
Scalable and secure authorization of smart things is of the crucial essence for the successful
deployment of the Internet of Things (IoT). Unauthorized access to smart things could …

Trustworthy digital twins in the industrial internet of things with blockchain

S Suhail, R Hussain, R Jurdak… - IEEE Internet …, 2021 - ieeexplore.ieee.org
Industrial processes rely on sensory data for critical decision-making processes. Extracting
actionable insights from the collected data calls for an infrastructure that can ensure the …

Dynamic bargain game theory in the internet of things for data trustworthiness

AC Sumathi, M Akila, R Pérez de Prado, M Wozniak… - Sensors, 2021 - mdpi.com
Smart home and smart building systems based on the Internet of Things (IoT) in smart cities
currently suffer from security issues. In particular, data trustworthiness and efficiency are two …

On the role of hash-based signatures in quantum-safe internet of things: Current solutions and future directions

S Suhail, R Hussain, A Khan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is gaining ground as a pervasive presence around us by
enabling miniaturized “things” with computation and communication capabilities to collect …

Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space

S Suhail, R Hussain, A Khan, CS Hong - Computers in Industry, 2020 - Elsevier
Trustworthy data is the fuel for ensuring transparent traceability, precise decision-making,
and cogent coordination in the Supply Chain (SC) space. However, the disparate data silos …

Towards a secure Internet of Things: A comprehensive study of second line defense mechanisms

M Dutta, J Granjal - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) exemplifies a large network of sensing and actuating devices
that have penetrated into the physical world enabling new applications like smart homes …

Data provenance in security and privacy

B Pan, N Stakhanova, S Ray - ACM Computing Surveys, 2023 - dl.acm.org
Provenance information corresponds to essential metadata that describes the entities, users,
and processes involved in the history and evolution of a data object. The benefits of tracking …

Intelligent agent based virtual clustering and multi-context aware routing for congestion mitigation in secure RPL-IoT environment

MM Sithik, BM Kumar - Ad Hoc Networks, 2022 - Elsevier
Abstract RPL (Routing Protocol for Low power Lossy network) is a routing protocol for
Internet of Things (IoT) network with low power consumption. RPL faces many security …

Blockchain-based security in smart grid network

S Mishra - International Journal of Communication …, 2022 - inderscienceonline.com
The cybersecurity threats in the smart grid network are prominent with conventional
approaches providing integrated security control and communication protection for smart …

SAMP-RPL: secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks

S Sahraoui, N Henni - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Abstract The Internet of things (IoT) is made up of huge sets of networked low-power
devices. Regardless of the application specificities, those devices are generally tasked to …