[HTML][HTML] Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends

A Khan, A Ahmad, M Ahmed, J Sessa… - Complex & Intelligent …, 2022 - Springer
Scalable and secure authorization of smart things is of the crucial essence for the successful
deployment of the Internet of Things (IoT). Unauthorized access to smart things could …

[HTML][HTML] Survey on smart homes: Vulnerabilities, risks, and countermeasures

B Hammi, S Zeadally, R Khatoun, J Nebhen - Computers & Security, 2022 - Elsevier
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized
the way we live and interact with each other as well as with various types of systems and …

[HTML][HTML] Institutional strategies for cybersecurity in higher education institutions

ECK Cheng, T Wang - Information, 2022 - mdpi.com
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations.
Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity …

[HTML][HTML] A blockchain-based certificate revocation management and status verification system

YCE Adja, B Hammi, A Serhrouchni, S Zeadally - Computers & Security, 2021 - Elsevier
Revocation management is one of the main tasks of the Public Key Infrastructure (PKI). It is
also critical to the security of any PKI. As a result of the increase in the number and sizes of …

A formally verified blockchain-based decentralised authentication scheme for the internet of things

K Hameed, S Garg, MB Amin, B Kang - The Journal of Supercomputing, 2021 - Springer
With the proliferation of intelligent devices in the Internet of Things (IoT), the security of IoT
devices is becoming a major concern as an attacker can exploit network services via …

Blockchain-based solution for detecting and preventing fake check scams

B Hammi, S Zeadally, YCE Adja… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Fake check scam is one of the most common attacks used to commit fraud against
consumers. This fraud is particularly costly for victims because they generally lose …

A sidechain-based decentralized authentication scheme via optimized two-way peg protocol for smart community

M Li, H Tang, AR Hussein… - IEEE Open Journal of the …, 2020 - ieeexplore.ieee.org
In this work, we propose a novel sidechain structure via an optimized two-way peg protocol
for device authentication in the smart community in order to overcome the limitations of …

[HTML][HTML] A secure multipath reactive protocol for routing in IoT and HANETs

B Hammi, S Zeadally, H Labiod, R Khatoun, Y Begriche… - Ad Hoc Networks, 2020 - Elsevier
Abstract In numerous Internet of Things (IoT) scenarios (such as Intelligent Transportation
System (ITS) or environment sensing), the ad hoc mode is widely used. Ad-hoc networks …

Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system

ES Babu, MS Rao, G Swain… - … Journal of Network …, 2023 - Wiley Online Library
The technological integration of the Internet of Things (IoT)‐Cloud paradigm has enabled
intelligent linkages of things, data, processes, and people for efficient decision making …

Survey on blockchain enabled authentication for industrial Internet of Things

RP Sukumaran, S Benedict - … Conference on I-SMAC (IoT in …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) integrates heterogeneous industrial devices,
intelligent sensors, and actuators to provide a new dimension to the industrial systems and …