[HTML][HTML] A lightweight blockchain-based IoT identity management approach

MA Bouras, Q Lu, S Dhelim, H Ning - Future Internet, 2021 - mdpi.com
Identity management is a fundamental feature of Internet of Things (IoT) ecosystem,
particularly for IoT data access control. However, most of the actual works adopt centralized …

SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices

F Farha, H Ning, K Ali, L Chen… - IEEE internet of things …, 2020 - ieeexplore.ieee.org
With the development of the cloud-based Internet of Things (IoT), people and things can
request services, access data, or control actuators located thousands of miles away. The …

A survey and tutorial on “connection exploding meets efficient communication” in the Internet of Things

H Ning, F Farha, ZN Mohammad… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT)-enabled sensors and services have increased exponentially
recently. Transmitting the massive generated data and control messages becomes an …

Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks

Y Ma, Z Li - Information Sciences, 2023 - Elsevier
This paper addresses the problem of secure event-triggered control is to guarantee the
stability and security of a general class of industrial cyber-physical systems (CPSs) under …

Timestamp scheme to mitigate replay attacks in secure ZigBee networks

F Farha, H Ning, S Yang, J Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
ZigBee is one of the communication protocols used in the Internet of Things (IoT)
applications. In typical deployment scenarios involving low-cost and low-power IoT devices …

Era of Sentinel Tech: Charting Hardware Security Landscapes through Post-Silicon Innovation, Threat Mitigation and Future Trajectories

MBR Srinivas, E Konguvel - IEEE Access, 2024 - ieeexplore.ieee.org
To meet the demanding requirements of VLSI design, including improved speed, reduced
power consumption, and compact architectures, various IP cores from trusted and untrusted …

Multiple-input, multilayer-perception-based classification of traces from side-channel attacks

H Feng, J Zhou, W Lin, Y Zhang, Z Qu - Computer, 2020 - ieeexplore.ieee.org
Side-channel analysis concerns cryptanalytic attacks that exploit the physical environment of
cryptographic modules by analyzing leaking emanations and obtaining the encryption key …

IoT Identity Management Systems: The State-of-the-Art, Challenges and a Novel Architecture

SK Gebresilassie, J Rafferty, L Chen, Z Cui… - International Conference …, 2024 - Springer
Abstract The Internet of Things (IoT) is a technology paradigm that has transformed several
domains including manufacturing, agriculture, healthcare, power grids, travel and retail …

Идентификация цифровых устройств с помощью бистабильных элементов, реализованных на FPGA

М Кайкы - 2022 - libeldoc.bsuir.by
Данная работа посвящена изучению внутрикристальных и межкристальных
статических ячеек памяти, построенных на двух инверторах с обратной связью …

[PDF][PDF] A Lightweight Blockchain-Based IoT Identity Management Approach. Future Internet 2021, 13, 24

MA Bouras, Q Lu, S Dhelim, H Ning - 2021 - researchgate.net
Identity management is a fundamental feature of Internet of Things (IoT) ecosystem,
particularly for IoT data access control. However, most of the actual works adopt centralized …