[HTML][HTML] An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems

S Selvarajan, G Srivastava, AO Khadidos… - Journal of Cloud …, 2023 - Springer
Abstract The Industrial Internet of Things (IIoT) promises to deliver innovative business
models across multiple domains by providing ubiquitous connectivity, intelligent data …

[HTML][HTML] Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology

A Falayi, Q Wang, W Liao, W Yu - Future Internet, 2023 - mdpi.com
The Internet of Things (IoT) continues to attract attention in the context of computational
resource growth. Various disciplines and fields have begun to employ IoT integration …

Environmental Self‐Adaptive Wind Energy Harvesting Technology for Self‐Powered System by Triboelectric‐Electromagnetic Hybridized Nanogenerator with Dual …

S Yong, H Wang, Z Lin, X Li, B Zhu… - Advanced Energy …, 2022 - Wiley Online Library
Natural wind energy harvesting enables a far‐reaching and sustainable solution to supply
pervasive sensors in the Internet of Things (IoT). Electromagnetic generators (EMGs) …

Analysis of Consumer IoT Device Vulnerability Quantification Frameworks

SA Baho, J Abawajy - Electronics, 2023 - mdpi.com
The increasing deployment of Internet of Things (IoT) devices in mission-critical systems has
made them more appealing to attackers. Cyberattacks on IoT devices have the potential to …

Special issue on Distributed Intelligence at the Edge for the Future Internet of Things

A Goscinski, FC Delicato, G Fortino… - Journal of Parallel and …, 2023 - Elsevier
Currently and even more in the future, business, industry, finance and retail, healthcare,
media, entertainment, and many others, are and will be completely managed, coordinated …

Advancing security in the industrial internet of things using deep progressive neural networks

M Sharma, S Pant, P Yadav, DK Sharma… - Mobile Networks and …, 2023 - Springer
A machine learning algorithm that can solve complex tasks by leveraging information
through transfer learning while avoiding catastrophic forgetting of previously learned data …

UtilityAware: A Framework for Data Privacy Protection in e-Health

SA Moqurrab, T Naeem, MS Malik, AA Fayyaz… - Information …, 2023 - Elsevier
Data privacy in e-health deals with the protection of sensitive medical information that is
collected, stored, and analyzed in electronic health systems. Several organizations publish …

[HTML][HTML] BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things

SE Ali, N Tariq, FA Khan, M Ashraf, W Abdul, K Saleem - Sensors, 2023 - mdpi.com
Numerous sensitive applications, such as healthcare and medical services, need reliable
transmission as a prerequisite for the success of the new age of communications …

HOTD: A holistic cross-layer time-delay attack detection framework for unmanned aerial vehicle networks

W Zhai, S Sun, L Liu, Y Ding, W Lu - Journal of Parallel and Distributed …, 2023 - Elsevier
Recently, unmanned aerial vehicle (UAV) networks have been widely used in military and
civilian scenarios; however, they suffer various attacks. Time-delay attacks maliciously delay …

Analysis of Machine Learning Model for Anomaly and Attack Detection in IoT Devices

PK Yadav, A Kumar - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
Today, everything is evolving to be intelligent, whether it is a smart house or a smart
industry, related to the usage of smart device, with referring to Internet of Things (IoT) …