Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

[HTML][HTML] Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …

[HTML][HTML] BAuth-ZKP—A blockchain-based multi-factor authentication mechanism for securing smart cities

MO Ahmad, G Tripathi, F Siddiqui, MA Alam, MA Ahad… - Sensors, 2023 - mdpi.com
The overwhelming popularity of technology-based solutions and innovations to address day-
to-day processes has significantly contributed to the emergence of smart cities. where …

Consensus-based mutual authentication scheme for Industrial IoT

A Haj-Hassan, Y Imine, A Gallais, B Quoitin - Ad Hoc Networks, 2023 - Elsevier
Authentication of new joining nodes in IoT networks is a critical element for maintaining its
security. It ensures the legitimacy of the network to the joining node, and the authorization of …

A lightweight authentication and key exchange protocol with anonymity for IoT

D He, Y Cai, S Zhu, Z Zhao, S Chan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The number of IoT devices is growing rapidly, and the interaction between devices and
servers is also more frequent. However, IoT devices are often at the edge of the network …

A cryptography and machine learning based authentication for secure data-sharing in federated cloud services environment

AK Singh, D Saxena - Journal of Applied Security Research, 2022 - Taylor & Francis
Secure mutual authentication is an indispensable requirement to share organizational
invaluable data among collaborating entities in federated cloud environment. This work …

[HTML][HTML] Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions

JPA Yaacoub, HN Noura, O Salman - Internet of Things and Cyber-Physical …, 2023 - Elsevier
Abstract Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a
reputation for not only building Machine Learning (ML) models that rely on distributed …

A robust device-to-device continuous authentication protocol for the internet of things

A Badhib, S Alshehri, A Cherif - IEEE Access, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is a heterogeneous environment that connects billions of
devices. Thus, it is a significantly high-value target for attackers and suffers from several …