Internet of things security: A top-down survey

DE Kouicem, A Bouabdallah, H Lakhlef - Computer Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) is one of the promising technologies that has attracted a lot
of attention in both industrial and academic fields these years. It aims to integrate seamlessly …

A survey on internet-of-things security: threats and emerging countermeasures

D Swessi, H Idoudi - Wireless Personal Communications, 2022 - Springer
Internet of things (IoT) is a world wide network and set of paradigms that are intended to
allow communications between anything, anytime and anywhere. However, connected …

Omniledger: A secure, scale-out, decentralized ledger via sharding

E Kokoris-Kogias, P Jovanovic, L Gasser… - … IEEE symposium on …, 2018 - ieeexplore.ieee.org
Designing a secure permissionless distributed ledger (blockchain) that performs on par with
centralized payment processors, such as Visa, is a challenging task. Most existing …

Multi-layer blockchain-based security architecture for internet of things

H Honar Pajooh, M Rashid, F Alam, S Demidenko - Sensors, 2021 - mdpi.com
The proliferation of smart devices in the Internet of Things (IoT) networks creates significant
security challenges for the communications between such devices. Blockchain is a …

Sok: Communication across distributed ledgers

A Zamyatin, M Al-Bassam, D Zindros… - … Cryptography and Data …, 2021 - Springer
Since the inception of Bitcoin, a plethora of distributed ledgers differing in design and
purpose has been created. While by design, blockchains provide no means to securely …

Security threats and measures in the Internet of Things for smart city infrastructure: A state of art

R Sharma, R Arya - Transactions on Emerging …, 2023 - Wiley Online Library
Abstract The Internet of Things (IoT) is a network of physical objects or “things” implanted
with electronics, software, sensors, and connectivity to allow them to exchange data with …

{CHAINIAC}: Proactive {Software-Update} transparency via collectively signed skipchains and verified builds

K Nikitin, E Kokoris-Kogias, P Jovanovic… - 26th USENIX Security …, 2017 - usenix.org
Software-update mechanisms are critical to the security of modern systems, but their
typically centralized design presents a lucrative and frequently attacked target. In this work …

A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective

HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …

Bidm: a blockchain-enabled cross-domain identity management system

R Chen, F Shu, S Huang, L Huang… - Journal of …, 2021 - ieeexplore.ieee.org
Reliable identity management and authentication are significant for network security. In
recent years, as traditional centralized identity management systems suffer from security and …

Drynx: Decentralized, secure, verifiable system for statistical queries and machine learning on distributed datasets

D Froelicher, JR Troncoso-Pastoriza… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Data sharing has become of primary importance in many domains such as big-data
analytics, economics and medical research, but remains difficult to achieve when the data …