Internet of things: A comprehensive overview on protocols, architectures, technologies, simulation tools, and future directions

M Mansour, A Gamal, AI Ahmed, LA Said, A Elbaz… - Energies, 2023 - mdpi.com
The Internet of Things (IoT) is a global network of interconnected computing, sensing, and
networking devices that can exchange data and information via various network protocols. It …

Iot platforms and security: An analysis of the leading industrial/commercial solutions

G Fortino, A Guerrieri, P Pace, C Savaglio, G Spezzano - Sensors, 2022 - mdpi.com
For simplifying and speeding up the development of the Internet of Things (IoT) ecosystem,
there has been a proliferation of IoT platforms, built up according to different design …

Hardware security for Internet of Things identity assurance

A Cirne, PR Sousa, JS Resende… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …

Predictive maintenance in industry 4.0 for the SMEs: A decision support system case study using open-source software

M Pejić Bach, A Topalović, Ž Krstić, A Ivec - Designs, 2023 - mdpi.com
Predictive maintenance is one of the most important topics within the Industry 4.0 paradigm.
We present a prototype decision support system (DSS) that collects and processes data from …

Microservice security: a systematic literature review

D Berardi, S Giallorenzo, J Mauro, A Melis… - PeerJ Computer …, 2022 - peerj.com
Microservices is an emerging paradigm for developing distributed systems. With their
widespread adoption, more and more work investigated the relation between microservices …

Hardware-based solutions for trusted cloud computing

O Demigha, R Larguet - Computers & Security, 2021 - Elsevier
The increasing number of threats targeting cloud computing and the exploitation of
specifically privileged software vulnerabilities have pushed the security managers of cloud …

Improved secure encryption with energy optimization using random permutation pseudo algorithm based on internet of thing in wireless sensor networks

S Nagaraj, AB Kathole, L Arya, N Tyagi, SB Goyal… - Energies, 2022 - mdpi.com
The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this
expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low …

The IoT and the new EU cybersecurity regulatory landscape

PG Chiara - International Review of Law, Computers & Technology, 2022 - Taylor & Francis
This article aims to cast light on how the fast-evolving European cybersecurity regulatory
framework would impact the Internet of Things (IoT) domain. The legal analysis investigates …

A systematic state-of-art review on digital identity challenges with solutions using conjugation of IOT and blockchain in healthcare

SK Jena, RC Barik, R Priyadarshini - Internet of Things, 2024 - Elsevier
Digital Identity is a prominent practice across every digital platform for maintaining
confidentiality and privacy. The demand for Internet of Things (IoT) and its allied …

[HTML][HTML] Modeling time delay, external noise and multiple malware infections in wireless sensor networks

CNH Nwokoye, V Madhusudanan, MN Srinivas… - Egyptian Informatics …, 2022 - Elsevier
The essentiality of wireless sensor networks (WSNs) in military and health applications
cannot be overemphasized, and this has made these tiny sensors soft targets for malware …