Challenges and opportunities in securing the industrial internet of things

M Serror, S Hack, M Henze, M Schuba… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Given the tremendous success of the Internet of Things in interconnecting consumer
devices, we observe a natural trend to likewise interconnect devices in industrial settings …

Recent advances on industrial data-driven energy savings: Digital twins and infrastructures

SY Teng, M Touš, WD Leong, BS How, HL Lam… - … and Sustainable Energy …, 2021 - Elsevier
Data-driven models for industrial energy savings heavily rely on sensor data,
experimentation data and knowledge-based data. This work reveals that too much research …

Demystifying arm trustzone: A comprehensive survey

S Pinto, N Santos - ACM computing surveys (CSUR), 2019 - dl.acm.org
The world is undergoing an unprecedented technological transformation, evolving into a
state where ubiquitous Internet-enabled “things” will be able to generate and share large …

Evaluating critical security issues of the IoT world: Present and future challenges

M Frustaci, P Pace, G Aloi… - IEEE Internet of things …, 2017 - ieeexplore.ieee.org
Social Internet of Things (SIoT) is a new paradigm where Internet of Things (IoT) merges
with social networks, allowing people and devices to interact, and facilitating information …

CP-BDHCA: Blockchain-Based Confidentiality-Privacy Preserving Big Data Scheme for Healthcare Clouds and Applications

H Ghayvat, S Pandya, P Bhattacharya… - IEEE Journal of …, 2021 - ieeexplore.ieee.org
Healthcare big data (HBD) allows medical stakeholders to analyze, access, retrieve
personal and electronic health records (EHR) of patients. Mostly, the records are stored on …

Trust in edge-based internet of things architectures: state of the art and research challenges

L Fotia, F Delicato, G Fortino - ACM Computing Surveys, 2023 - dl.acm.org
The Internet of Things (IoT) aims to enable a scenario where smart objects, inserted into
information networks, supply smart services for human beings. The introduction of edge …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …

Industrial Internet of Things: A systematic literature review and insights

Y Liao, EFR Loures… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The connection of embedded computing devices via the Internet has dramatically changed
the way people live. This concept has also been extended to the industrial sector. It not only …

A survey of defensive deception: Approaches using game theory and machine learning

M Zhu, AH Anwar, Z Wan, JH Cho… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …

A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …