Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








283 Hits in 6.9 sec

Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach

Uzair Javaid, Furqan Jameel, Umair Javaid, Muhammad Toaha Raza Khan, Riku Jäntti, Zengpeng Li
2020 Mobile Information Systems  
Recent technological developments in wireless and sensor networks have led to a paradigm shift in interacting with everyday objects, which nurtured the concept of Internet of Things (IoT).  ...  Therefore, access control is one of the crucial aspects of an IoT ecosystem that defines an entry point for a device or a user in the network.  ...  Conflicts of Interest e authors declare that they have no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2020/8831976 fatcat:cdwkx4alffhyvotgyfz6hh6euq

Secured by Blockchain: Safeguarding Internet of Things Devices

Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Romain Griffiths
2019 IEEE Consumer Electronics Magazine  
In this paper, we consider possible use cases and applications of the blockchain for the consumer electronics (CE) industry and its interplay with the Internet of things.  ...  Blockchain is a disruptive technology that has been characterised to be the next big thing and has already gained a broad recognition by experts in diverse fields.  ...  Romain Griffiths (romain.griffiths@neofacto.com) is the CTO of Neofacto, France, and a technical advisor of Scorechain SA, Luxembourg, both companies specialising in Blockchain technologies.  ... 
doi:10.1109/mce.2019.2892221 fatcat:cw6syfearncuzkmp76im4g2z3a

A Blockchain-based Security Architecture for the Internet of Things

Kelechi G. Eze, Cajetan M. Akujuobi, Shermar Hunter, Shumon , Alam, Sarhan Musa, Justin Foreman
2022 WSEAS Transactions on Information Science and Applications  
We then present a blockchain-based security architecture for the internet of things and practically investigated its security feature through implementation of various security mechanism.  ...  The Internet of Things (IoT) is growing at a very fast pace and being increasingly adopted in many scenarios of industrial applications such as energy (smart grid), automobile (smart cars), healthcare  ...  Devices on this layer are vulnerable to a variety of threats. The attackers may malicious node could be accessed or captured in the IoT system, which will now act as rogue node that is controlled.  ... 
doi:10.37394/23209.2022.19.2 fatcat:xvzqqyfbnvewbfynqtfjyken4m

Internet of things: Survey on security

Diego Mendez Mena, Ioannis Papapanagiotou, Baijian Yang
2018 Information Security Journal  
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things".  ...  In this paper,we aim to provide a thorough survey related to the privacy and security challenges of the IoT.  ...  INTRODUCTION T HE essence of the Internet of Things (IoT) is the concept of every device blending with the existence of human beings.  ... 
doi:10.1080/19393555.2018.1458258 fatcat:4323ta6rlrd7tfruisq6ryjone

Applications of Blockchains in the Internet of Things: A Comprehensive Survey

Muhammad Salek Ali, Massimo Vecchio, Miguel Pincheira, Koustabh Dolui, Fabio Antonelli, Mubashir Husain Rehmani
2018 IEEE Communications Surveys and Tutorials  
In recent years, this technology has attracted significant scientific interest in research areas beyond the financial sector, one of them being the Internet of Things (IoT).  ...  From an abstract perspective, a blockchain is a distributed ledger capable of maintaining an immutable log of transactions happening in a network.  ...  Blockchain-Based IoT Privacy Solutions in Industry In industry, an interesting approach to tackle one of the many privacy issues faced by the Internet of Things, is done by the company Lola Cloud, 10 a  ... 
doi:10.1109/comst.2018.2886932 fatcat:b6m4roave5c7tpdlzgguustf6e

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices.  ...  Index Terms-Threats to the IoT, Internet of Things, malware attacks on the Internet of Things, attack methodology, security and privacy, IoT security framework, security guidelines.  ...  Node replication attack and insertion of rogue devices Weak network and device access control [78, 86] 9.  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4

An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)

Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis
2023 Algorithms  
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT).  ...  The IIoT, a seamless integration of the physical and digital realms with minimal human intervention, has ushered in radical changes in the economy and modern business practices.  ...  Smart Devices and the Internet of Things (IoT) [47] : Federated learning is well-suited for scenarios involving edge devices or IoT devices.  ... 
doi:10.3390/a16080378 fatcat:sf7sjjrf65fzfg5eyw4eopym7e

A cloud based 3-tier data security framework for industrial internet of things

Mirador G. Labrador, Abegail Bordios, Weiyan Hou
2021 Indonesian Journal of Electrical Engineering and Computer Science  
<p>The convergence of microelectronics and micromechanical system within a sensing device, the proliferation of wireless communication, and the use of software-driven equipment are already changing the  ...  This situation compels the industries to adopt industrial internet of things (IIoT) systems and processes with the main objective-to improve the processes and increase production.  ...  Likewise, the authors also wishes to extend gratitude to Prof. Dr. Weiyan Hou of Zhengzhou University for the expertise and ingsights accorded which leads to the completion of the study.  ... 
doi:10.11591/ijeecs.v24.i2.pp780-788 fatcat:n7kranyi5vaejb5kvmybawqlyu

BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things

Shayan E Ali, Noshina Tariq, Farrukh Aslam Khan, Muhammad Ashraf, Wadood Abdul, Kashif Saleem
2023 Sensors  
This study proposes a blockchain-based fuzzy trust management framework (BFT-IoMT) to detect and isolate Sybil nodes in IoMT networks.  ...  Especially for life-threatening diseases like COVID-19, it is crucial to have devices connected to the Internet of Medical Things (IoMT) that can be believed to respond with high reliability and accuracy  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s23094265 fatcat:k7lmgqhkw5cnlbpzdklpfq2zui

An Efficient Security Solution for Industrial Internet of Things Applications

Alaa Omran Almagrabi
2022 Computers Materials & Continua  
The Industrial Internet of Things (IIoT) has been growing for presentations in industry in recent years. Security for the IIoT has unavoidably become a problem in terms of creating safe applications.  ...  Hence this blockchain-based endpoint protection platform (BCEPP) has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints.  ...  Funding Statement: The authors received funding as stated in the acknowledgment.  ... 
doi:10.32604/cmc.2022.026513 fatcat:4k3kgyqjbbeatbznfuopao2xky

Blockchain Leveraged Decentralized IoT eHealth Framework

Md.Ashraf Uddin, Andrew Stranieri, Iqbal Gondal, Venki Balasubramanian
2020 Internet of Things  
Introduction Blockchain into the Internet of Things data streams. The broker assigns Blockchain tasks to various Fog devices so that the computational challenges can be met.  ...  Novo [42] designed a Blockchain-based decentralized architecture to manage access control for memory and power-constrained IoT devices.  ... 
doi:10.1016/j.iot.2020.100159 fatcat:46uhobxn4rgm3pydfmn7263v3a

Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets

Georgios Spathoulas, Nikolaos Giachoudis, Georgios-Paraskevas Damiris, Georgios Theodoridis
2019 Future Internet  
Internet of Things is one of the most significant latest developments in computer science.  ...  This information exchange is governed by a blockchain smart contract, that ensures the integrity of both the procedure and the information.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/fi11110226 fatcat:jfmpbn5ssbdntacmuftyvuv4sa

Zero-Tolerance Security Paradigm for Enterprise-Specific Industrial Internet of Things

Usman Tariq
2022 Electronics  
During the conceptualization phase, the authors aimed to compel the following: (a) that restriction of access should be based on the presence of unexpected device actions that may point to a security breach  ...  The complex industrial environment of the 21st century is equipped with the Internet of Things platform, with the objective of real-time operational visibility, improved device management and predictive  ...  Conflicts of Interest: The author declares that he has no conflict of interest to report regarding the present study.  ... 
doi:10.3390/electronics11233953 fatcat:qan5cdzw7fefzlijy4u7pv3h7i

Federated Learning for the Internet-of-Medical-Things: A Survey

Vivek Kumar Prasad, Pronaya Bhattacharya, Darshil Maru, Sudeep Tanwar, Ashwin Verma, Arunendra Singh, Amod Kumar Tiwari, Ravi Sharma, Ahmed Alkhayyat, Florin-Emilian Țurcanu, Maria Simona Raboaca
2022 Mathematics  
Internet-of-Medical-Things (IoMT) ecosystems.  ...  A case study of a trusted cross-cluster-based FL, named Cross-FL, is presented, highlighting the gradient aggregation policy over remotely connected and networked hospitals.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/math11010151 fatcat:76h5ms2ggzapvbwnciswyot7ma

Dimensions of Internet of Things: Technological Taxonomy Architecture Applications and Open Challenges—A Systematic Review

Krishna Kumar, Aman Kumar, Narendra Kumar, Mazin Abed Mohammed, Alaa S. Al-Waisy, Mustafa Musa Jaber, Rachna Shah, Mohammed Nasser Al-Andoli
2022 Wireless Communications and Mobile Computing  
We are traversing the growing emerging technology paradigms in today's advanced technological world. In this present era, the Internet of Things (IoT) is extensively used in all sectors.  ...  IoT is the ecosystem of smart devices which contains sensors, smart objects, networking, and processing units. These integrated devices provide better services to the end user.  ...  [27] proposed a lightweight real-time algorithm that enables the identification of rogue access points for embedded IoT devices.  ... 
doi:10.1155/2022/9148373 doaj:d95dff8cd58d477abc8b22d6a519f19a fatcat:rm4lgc5y5jcinb6ffqrvbrvgnu
« Previous Showing results 1 — 15 out of 283 results