Future smart connected communities to fight covid-19 outbreak

D Gupta, S Bhatt, M Gupta, AS Tosun - Internet of Things, 2021 - Elsevier
Abstract Internet of Things (IoT) has grown rapidly in the last decade and continues to
develop in terms of dimension and complexity, offering a wide range of devices to support a …

Attribute-based access control for AWS internet of things and secure industries of the future

S Bhatt, TK Pham, M Gupta, J Benson, J Park… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every
aspect. With a disruption of IoT devices and applications, attackers are leveraging weak …

Searchable encryption with access control in industrial internet of things (IIoT)

J Bader, AL Michala - Wireless Communications and Mobile …, 2021 - Wiley Online Library
The technological advancements in the Internet of Things (IoT) and related technologies
lead to revolutionary advancements in many sectors. One of these sectors, is the industrial …

Health care insurance fraud detection using blockchain

G Saldamli, V Reddy, KS Bojja… - … on software defined …, 2020 - ieeexplore.ieee.org
The health care industry is one of the important service providers that improves people lives.
As the cost of the healthcare service increases, health insurance becomes the only way to …

Access control model for google cloud iot

D Gupta, S Bhatt, M Gupta, O Kayode… - 2020 IEEE 6th Intl …, 2020 - ieeexplore.ieee.org
The prevalence of Internet of Things (IoT) is growing rapidly with increasing influence on our
daily life. IoT has received considerable attention in both academia and industry recently …

Abac-cc: Attribute-based access control and communication control for internet of things

S Bhatt, R Sandhu - Proceedings of the 25th ACM Symposium on Access …, 2020 - dl.acm.org
Internet of Things (IoT) is revolutionizing the capabilities of the Internet with billions of
connected devices in the cyberspace. These devices are commonly referred to as smart …

A Secure IoT‐Based Cloud Platform Selection Using Entropy Distance Approach and Fuzzy Set Theory

A Chakraborty, M Jindal, MR Khosravi… - Wireless …, 2021 - Wiley Online Library
With the growing emergence of the Internet connectivity in this era of Gen Z, several IoT
solutions have come into existence for exchanging large scale of data securely, backed up …

Transparent end-to-end security for publish/subscribe communication in cyber-physical systems

M Dahlmanns, J Pennekamp, IB Fink… - Proceedings of the …, 2021 - dl.acm.org
The ongoing digitization of industrial manufacturing leads to a decisive change in industrial
communication paradigms. Moving from traditional one-to-one to many-to-many …

Investigating the security threats on networked medical devices

D Zaldivar, AT Lo'Ai, F Muheidat - 2020 10th annual computing …, 2020 - ieeexplore.ieee.org
This paper explores the cyber security threat of Implanted Medical Devices. The widely use
of Internet of Thing capable devices in healthcare like pacemakers, infusion pumps, and …

[HTML][HTML] Authorisation models for IoT environments: A survey

JP Díaz, FA Mendoza - Internet of Things, 2024 - Elsevier
Authorization models are pivotal in the Internet of Things (IoT) ecosystem, ensuring secure
management of data access and communication. These models function after …