Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions

P Bagga, AK Das, V Chamola, M Guizani - Telecommunication Systems, 2022 - Springer
With rapid advancements in the technology, almost all the devices around are becoming
smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added …

[HTML][HTML] A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain

H Pourrahmani, A Yavarinasab, AMH Monazzah - Internet of Things, 2023 - Elsevier
The current advances in the Internet of Things (IoT) and the solutions being offered by this
technology have accounted IoT among the top ten technologies that will transform the global …

An intrusion detection system for edge-envisioned smart agriculture in extreme environment

D Javeed, T Gao, MS Saeed… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The deployment of Internet of Things (IoT) systems in Smart Agriculture (SA) operates in
extreme environments including wind, snowfall, flooding, landscape, and so on for collecting …

DeepSpoof: Deep Reinforcement Learning-Based Spoofing Attack in Cross-Technology Multimedia Communication

D Gao, L Ou, Y Liu, Q Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Cross-technology communication is essential for the Internet of Multimedia Things (IoMT)
applications, enabling seamless integration of diverse media formats, optimized data …

Radio frequency fingerprint identification for Internet of Things: A survey

L Xie, L Peng, J Zhang, A Hu - Security and Safety, 2024 - sands.edpsciences.org
Radio frequency fingerprint (RFF) identification is a promising technique for identifying
Internet of Things (IoT) devices. This paper presents a comprehensive survey on RFF …

Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm

T Aljrees, A Kumar, KU Singh, T Singh - Sensors, 2023 - mdpi.com
This research paper introduces a novel paradigm that synergizes innovative algorithms,
namely efficient data encryption, the Quondam Signature Algorithm (QSA), and federated …

Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare

Z Ashraf, Z Mahmood, M Iqbal - Future Internet, 2023 - mdpi.com
The advancement and innovations in wireless communication technologies including the
Internet of Things have massively changed the paradigms of health-based services. In …

A decentralized authentication scheme for smart factory based on blockchain

Z Cao, X Wen, S Ai, W Shang, S Huan - Scientific Reports, 2024 - nature.com
Abstract The Industrial Internet of Things (IIoT) is recognized as one of the revolutionary
technologies driving smart manufacturing and improving productivity. As manufacturing …

[PDF][PDF] Comprehensive Survey on AI-Based Technologies for Enhancing IoT Privacy and Security: Trends, Challenges, and Solutions

OEL Castro, X Deng, JH Park - HUMAN-CENTRIC COMPUTING AND …, 2023 - hcisj.com
Abstract The Internet of Things (IoT) is revolutionizing modern technology by connecting
numerous devices and applications. However, its lack of standardization has led to security …

[HTML][HTML] A methodology to identify identical single-board computers based on hardware behavior fingerprinting

PMS Sánchez, JMJ Valero, AH Celdrán, G Bovet… - Journal of Network and …, 2023 - Elsevier
The connectivity and resource-constrained nature of single-board devices open the door to
cybersecurity concerns affecting Internet of Things (IoT) scenarios. One of the most important …