Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0

A Mosteiro-Sanchez, M Barcelo, J Astorga… - Journal of Manufacturing …, 2020 - Elsevier
Industry 4.0 uses a subset of the IoT, called Industrial IoT (IIoT) to achieve connectivity,
interoperability and decentralisation. The deployment of industrial networks rarely considers …

Blockchain-based decentralized identification in iot: An overview of existing frameworks and their limitations

SM Hosseini, J Ferreira, PC Bartolomeu - Electronics, 2023 - mdpi.com
The popularity of the Internet of Things (IoT) and Industrial IoT (IIoT) has caused a rapid
increase in connected entities and exposed its lack of adequate Identity Management (IdM) …

Content object security in the internet of things: challenges, prospects, and emerging solutions

C Gündoğan, C Amsüss, TC Schmidt… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Content objects are confined data elements that carry meaningful information. Massive
amounts of content objects are published and exchanged every day on the Internet. The …

Concepts for a Semantically Accessible Materials Data Space: Overview over Specific Implementations in Materials Science

B Bayerlein, J Waitelonis, H Birkholz… - Advanced …, 2024 - Wiley Online Library
This article describes advancements in the ongoing digital transformation in materials
science and engineering. It is driven by domain‐specific successes and the development of …

IoT content object security with OSCORE and NDN: A first experimental comparison

C Gündoğan, C Amsüss, TC Schmidt… - 2020 IFIP Networking …, 2020 - ieeexplore.ieee.org
The emerging Internet of Things (IoT) challenges the end-to-end transport of the Internet by
low power lossy links and gateways that perform protocol translations. Protocols such as …

Toward a RESTful information-centric Web of Things: A deeper look at data orientation in CoAP

C Gündoğan, C Amsüss, TC Schmidt… - Proceedings of the 7th …, 2020 - dl.acm.org
The information-centric networking (ICN) paradigm offers replication of autonomously
verifiable content throughout a network, in which content is bound to names instead of hosts …

Nextgengw-a software framework based on mqtt and semantic definition format

C Resende, W Moreira… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
To access all the potential value present in IoT, the IoT devices need to be interoperable.
Some works in the literature target this issue, but it is not yet entirely solved, mainly because …

Information-centric Networking for the Constrained Internet of Things

C Gündoğan - 2022 - refubium.fu-berlin.de
Information-Centric Networking (ICN) promises an enhanced reliability for content retrievals
in the Internet of Things (IoT), while reducing link stress and network-related energy …

[PDF][PDF] Blockchain-Based Decentralized Identification in IoT: An Overview of Existing Frameworks and Their Limitations. Electronics 2023, 1, 0

SM Hosseini, J Ferreira, PC Bartolomeu - Int. J. Prod. Econ, 2022 - researchgate.net
The popularity of the Internet of Things (IoT) and Industrial IoT (IIoT) has caused a rapid
increase in connected entities and exposed its lack of adequate Identity Management (IdM) …

[PDF][PDF] More Lightweight, yet Stronger: Revisiting OSCORE's Replay Protection

KF Krentz, T Voigt - NDSS Workshop on Security and Privacy in …, 2024 - researchgate.net
Object Security for Constrained RESTful Environments (OSCORE) is an end-to-end security
solution for the Constrained Application Protocol (CoAP), which, in turn, is a lightweight …