A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach
2020
Mobile Information Systems
Recent technological developments in wireless and sensor networks have led to a paradigm shift in interacting with everyday objects, which nurtured the concept of Internet of Things (IoT). ...
Therefore, access control is one of the crucial aspects of an IoT ecosystem that defines an entry point for a device or a user in the network. ...
Conflicts of Interest e authors declare that they have no conflicts of interest regarding the publication of this paper. ...
doi:10.1155/2020/8831976
fatcat:cdwkx4alffhyvotgyfz6hh6euq
Secured by Blockchain: Safeguarding Internet of Things Devices
2019
IEEE Consumer Electronics Magazine
In this paper, we consider possible use cases and applications of the blockchain for the consumer electronics (CE) industry and its interplay with the Internet of things. ...
Blockchain is a disruptive technology that has been characterised to be the next big thing and has already gained a broad recognition by experts in diverse fields. ...
Romain Griffiths (romain.griffiths@neofacto.com) is the CTO of Neofacto, France, and a technical advisor of Scorechain SA, Luxembourg, both companies specialising in Blockchain technologies. ...
doi:10.1109/mce.2019.2892221
fatcat:cw6syfearncuzkmp76im4g2z3a
A Blockchain-based Security Architecture for the Internet of Things
2022
WSEAS Transactions on Information Science and Applications
We then present a blockchain-based security architecture for the internet of things and practically investigated its security feature through implementation of various security mechanism. ...
The Internet of Things (IoT) is growing at a very fast pace and being increasingly adopted in many scenarios of industrial applications such as energy (smart grid), automobile (smart cars), healthcare ...
Devices on this layer are vulnerable to a variety of threats. The attackers may malicious node could be accessed or captured in the IoT system, which will now act as rogue node that is controlled. ...
doi:10.37394/23209.2022.19.2
fatcat:xvzqqyfbnvewbfynqtfjyken4m
Internet of things: Survey on security
2018
Information Security Journal
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". ...
In this paper,we aim to provide a thorough survey related to the privacy and security challenges of the IoT. ...
INTRODUCTION T HE essence of the Internet of Things (IoT) is the concept of every device blending with the existence of human beings. ...
doi:10.1080/19393555.2018.1458258
fatcat:4323ta6rlrd7tfruisq6ryjone
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
2018
IEEE Communications Surveys and Tutorials
In recent years, this technology has attracted significant scientific interest in research areas beyond the financial sector, one of them being the Internet of Things (IoT). ...
From an abstract perspective, a blockchain is a distributed ledger capable of maintaining an immutable log of transactions happening in a network. ...
Blockchain-Based IoT Privacy Solutions in Industry In industry, an interesting approach to tackle one of the many privacy issues faced by the Internet of Things, is done by the company Lola Cloud, 10 a ...
doi:10.1109/comst.2018.2886932
fatcat:b6m4roave5c7tpdlzgguustf6e
Anatomy of Threats to The Internet of Things
2018
IEEE Communications Surveys and Tutorials
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices. ...
Index Terms-Threats to the IoT, Internet of Things, malware attacks on the Internet of Things, attack methodology, security and privacy, IoT security framework, security guidelines. ...
Node replication attack and insertion of
rogue devices
Weak network and device access control
[78, 86]
9. ...
doi:10.1109/comst.2018.2874978
fatcat:5qkflaozurb4nctkfrwswnbce4
An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
2023
Algorithms
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). ...
The IIoT, a seamless integration of the physical and digital realms with minimal human intervention, has ushered in radical changes in the economy and modern business practices. ...
Smart Devices and the Internet of Things (IoT) [47] : Federated learning is well-suited for scenarios involving edge devices or IoT devices. ...
doi:10.3390/a16080378
fatcat:sf7sjjrf65fzfg5eyw4eopym7e
A cloud based 3-tier data security framework for industrial internet of things
2021
Indonesian Journal of Electrical Engineering and Computer Science
<p>The convergence of microelectronics and micromechanical system within a sensing device, the proliferation of wireless communication, and the use of software-driven equipment are already changing the ...
This situation compels the industries to adopt industrial internet of things (IIoT) systems and processes with the main objective-to improve the processes and increase production. ...
Likewise, the authors also wishes to extend gratitude to Prof. Dr. Weiyan Hou of Zhengzhou University for the expertise and ingsights accorded which leads to the completion of the study. ...
doi:10.11591/ijeecs.v24.i2.pp780-788
fatcat:n7kranyi5vaejb5kvmybawqlyu
BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things
2023
Sensors
This study proposes a blockchain-based fuzzy trust management framework (BFT-IoMT) to detect and isolate Sybil nodes in IoMT networks. ...
Especially for life-threatening diseases like COVID-19, it is crucial to have devices connected to the Internet of Medical Things (IoMT) that can be believed to respond with high reliability and accuracy ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s23094265
fatcat:k7lmgqhkw5cnlbpzdklpfq2zui
An Efficient Security Solution for Industrial Internet of Things Applications
2022
Computers Materials & Continua
The Industrial Internet of Things (IIoT) has been growing for presentations in industry in recent years. Security for the IIoT has unavoidably become a problem in terms of creating safe applications. ...
Hence this blockchain-based endpoint protection platform (BCEPP) has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints. ...
Funding Statement: The authors received funding as stated in the acknowledgment. ...
doi:10.32604/cmc.2022.026513
fatcat:4k3kgyqjbbeatbznfuopao2xky
Blockchain Leveraged Decentralized IoT eHealth Framework
2020
Internet of Things
Introduction Blockchain into the Internet of Things data streams. The broker assigns Blockchain tasks to various Fog devices so that the computational challenges can be met. ...
Novo [42] designed a Blockchain-based decentralized architecture to manage access control for memory and power-constrained IoT devices. ...
doi:10.1016/j.iot.2020.100159
fatcat:46uhobxn4rgm3pydfmn7263v3a
Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets
2019
Future Internet
Internet of Things is one of the most significant latest developments in computer science. ...
This information exchange is governed by a blockchain smart contract, that ensures the integrity of both the procedure and the information. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/fi11110226
fatcat:jfmpbn5ssbdntacmuftyvuv4sa
Zero-Tolerance Security Paradigm for Enterprise-Specific Industrial Internet of Things
2022
Electronics
During the conceptualization phase, the authors aimed to compel the following: (a) that restriction of access should be based on the presence of unexpected device actions that may point to a security breach ...
The complex industrial environment of the 21st century is equipped with the Internet of Things platform, with the objective of real-time operational visibility, improved device management and predictive ...
Conflicts of Interest: The author declares that he has no conflict of interest to report regarding the present study. ...
doi:10.3390/electronics11233953
fatcat:qan5cdzw7fefzlijy4u7pv3h7i
Federated Learning for the Internet-of-Medical-Things: A Survey
2022
Mathematics
Internet-of-Medical-Things (IoMT) ecosystems. ...
A case study of a trusted cross-cluster-based FL, named Cross-FL, is presented, highlighting the gradient aggregation policy over remotely connected and networked hospitals. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/math11010151
fatcat:76h5ms2ggzapvbwnciswyot7ma
Dimensions of Internet of Things: Technological Taxonomy Architecture Applications and Open Challenges—A Systematic Review
2022
Wireless Communications and Mobile Computing
We are traversing the growing emerging technology paradigms in today's advanced technological world. In this present era, the Internet of Things (IoT) is extensively used in all sectors. ...
IoT is the ecosystem of smart devices which contains sensors, smart objects, networking, and processing units. These integrated devices provide better services to the end user. ...
[27] proposed a lightweight real-time algorithm that enables the identification of rogue access points for embedded IoT devices. ...
doi:10.1155/2022/9148373
doaj:d95dff8cd58d477abc8b22d6a519f19a
fatcat:rm4lgc5y5jcinb6ffqrvbrvgnu
« Previous
Showing results 1 — 15 out of 283 results