Article
Computer Science, Information Systems
Jaime Senor, Jorge Portilla, Gabriel Mujica
Summary: The article discusses the significance of post-quantum cryptography in protecting modern public-key encryption from potential attacks by quantum computers. It evaluates the performance of NTRU in the context of IoT, showing its suitability for wireless sensor networks designed with modern microcontrollers.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Chemistry, Analytical
Timothy Claeys, Malisa Vucinic, Thomas Watteyne, Franck Rousseau, Bernard Tourancheau
Summary: This paper provides a comprehensive comparison of the TLS and DTLS handshake in 6TiSCH networks, revealing that DTLS performs faster and more efficiently when network conditions are ideal, but suffers a greater performance penalty under unreliable communication links.
Article
Computer Science, Information Systems
Desta Haileselassie Hagos, Anis Yazidi, Oivind Kure, Paal E. Engelstad
Summary: With the emergence of IoT, the need for real-time capturing and analyzing network traffic traces to secure and manage enterprise network infrastructure has increased. Passive OS fingerprinting, achieved through advanced machine learning techniques, demonstrates the potential to significantly enhance accuracy by accurately predicting the TCP variant as a distinguishing feature, thereby reducing false alarms and improving cybersecurity measures.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Sy-Nam Tran, Van-Thuc Hoang, Duy-Hieu Bui
Summary: The rapid growth of the Internet of Things (IoT) has made it an important part of our lives, with high data throughput and low latency enabling real-time communication and data transmission, enhancing efficiency and decision-making in various industries. However, the security of high-speed IoT networks becomes a critical concern due to increasing data transmission. This paper proposes a hardware architecture for Ascon, a NIST Lightweight cryptography standard, to provide high-throughput, low-latency security services in IPSec protocols, with promising results.
Review
Computer Science, Information Systems
Muhammad Zunnurain Hussain, Zurina Mohd Hanapi
Summary: The Wireless Sensor Network in the Internet of Things (WSN-IoT) is revolutionizing the way we live, but there is a lack of research in network security.
Article
Computer Science, Information Systems
Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, Alireza Jolfaei, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
Summary: IoT devices are increasingly prevalent and require robust cybersecurity practices. Attack taxonomies help identify and mitigate vulnerabilities, ensuring secure IoT operation.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Desoky Abdelqawy, Abeer El-Korany, Amr Kamel, Soha Makady
Summary: The Internet of Things (IoT) faces challenges due to vendor diversity and lack of a common communication interface, resulting in reduced resource utilization and additional costs. This study proposes an IoT computing platform architecture, called Hub-OS, for efficient management of devices and applications from different vendors, enabling seamless integration and real-time processing.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Hardware & Architecture
Yulei Wu, Zehua Wang, Yuxiang Ma, Victor C. M. Leung
Summary: With the ambitious plans of renewal and expansion of industrialization in many countries, the efficiency, agility, and cost savings potentially resulting from the application of Industrial Internet of Things (IIoT) are drawing attentions. Blockchain and machine learning technologies may provide the next promising use case for IIoT but they are working in an adversarial way to some extent, with a focus on data privacy and security risks.
Article
Computer Science, Information Systems
Farhan Siddiqui, Jake Beley, Sherali Zeadally, Grant Braught
Summary: The Internet of Things (IoT) is a rapidly growing field that introduces a plethora of security risks with the increase in shared data. To ensure the success of IoT paradigm, securing data sent over IoT links is crucial. Implementing CoAP and DTLS for secure data transfer showed noticeable performance costs, a slight increase in energy consumption, and over 100% increase in average latency time for secure messages.
INTERNET OF THINGS
(2021)
Article
Computer Science, Information Systems
Mahmud Hossain, Golam Kayas, Yasser Karim, Ragib Hasan, Jamie Payton, S. M. Riazul Islam
Summary: This article introduces a compression-aware authorization protocol called CATComp, which enables IoT devices to exchange small-sized certificates and capability tokens over the IEEE 802.15.4 medium. By reducing the size of security materials, CATComp decreases communication latency and energy consumption, thereby improving device response speed and battery life.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Rajesh Kumar, Rewa Sharma
Summary: The Internet of Things (IoT) encounters numerous security and privacy issues, and integrating blockchain technology into the IoT environment ensures trust among devices and provides more secure approaches.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Automation & Control Systems
Mario Barbareschi, Valentina Casola, Alessandra De Benedictis, Erasmo La Montagna, Nicola Mazzocca
Summary: This article discusses the adoption of PUFs in the Industrial Internet of Things context, proposing a Pseudo-PUF architecture that successfully implements advanced security primitives while meeting device resource constraints. Analysis shows good results with negligible impact on devices, making the approach suitable for IIoT deployments.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Theory & Methods
Christian Berger, Philipp Eichhammer, Hans P. Reiser, Joerg Domaschka, Franz J. Hauck, Gerhard Habiger
Summary: This article systematically presents the existing scientific efforts in making IoT systems resilient, including discussing the taxonomy and classification of resilience, surveying state-of-the-art resilience mechanisms, and exploring practical issues related to resilience mechanisms for developers designing resilient IoT systems.
ACM COMPUTING SURVEYS
(2021)
Article
Computer Science, Information Systems
Sreenivas Sudarshan Seshadri, David Rodriguez, Mukunda Subedi, Kim-Kwang Raymond Choo, Sara Ahmed, Qian Chen, Junghee Lee
Summary: Proposed use of blockchain in monitoring framework for IoT devices allows for automatic isolation of compromised devices, offering lower latency and overhead compared to traditional frameworks and enabling existing IoT devices to join without modification.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Jiangfeng Sun, Fazlullah Khan, Junxia Li, Mohammad Dahman Alshehri, Ryan Alturki, Mohammad Wedyan
Summary: This article presents a mutual authentication scheme for devices-to-server and vice versa in the operational Internet of Medical Things to ensure secure communication sessions among multiple mobile devices and servers. By introducing an offline phase for registration process, blocking potential intruder devices, and using encryption and decryption schemes, data reliability is ensured during communication sessions.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Shahid Raza, Runar Mar Magnusson
IEEE INTERNET OF THINGS JOURNAL
(2019)
Review
Physics, Applied
Thomas McGrath, Ibrahim E. Bagci, Zhiming M. Wang, Utz Roedig, Robert J. Young
APPLIED PHYSICS REVIEWS
(2019)
Article
Computer Science, Information Systems
Peng Cheng, Ibrahim Ethem Bagci, Utz Roedig, Jeff Yan
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
(2020)
Article
Computer Science, Information Systems
Joel Hoglund, Samuel Lindemer, Martin Furuhed, Shahid Raza
COMPUTERS & SECURITY
(2020)
Article
Computer Science, Information Systems
Mudassar Aslam, Bushra Mohsin, Abdul Nasir, Shahid Raza
COMPUTERS & SECURITY
(2020)
Article
Computer Science, Information Systems
Mudassar Aslam, Simon Bouget, Shahid Raza
Summary: This paper proposes a secure and trustworthy solution for virtual machine migration in cloud environments, ensuring user VMs are only migrated to trustworthy and compliant cloud platforms using Trust_Token mechanism. Unlike previous schemes, this solution does not rely on an active trusted third party, and formal security analysis shows the protocol's safety.
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT
(2021)
Article
Computer Science, Information Systems
Salvador Perez, Jose L. Hernandez-Ramos, Shahid Raza, Antonio Skarmeta
IEEE INTERNET OF THINGS JOURNAL
(2020)
Article
Multidisciplinary Sciences
Nema M. Abdelazim, Matthew J. Fong, Thomas McGrath, Christopher S. Woodhead, Furat Al-Saymari, Ibrahim E. Bagci, Alex T. Jones, Xintai Wang, Robert J. Young
Summary: The study demonstrates a system in which variations in the local arrangement of quantum dots and gold nanoparticles can be used to uniquely identify specific samples at the nanoscale, and this position-dependent interaction can be measured optically.
SCIENTIFIC REPORTS
(2021)
Article
Engineering, Civil
Valaenthin Tratter, Mudassar Aslam, Shahid Raza
Summary: This study introduces a novel vehicle attestation scheme to detect tampering in the software stack of a vehicle and guarantee that the previous user has not altered the vehicle's software. The solution includes a software module in the vehicle and a mobile-based user application for the vehicle owner to monitor software integrity, utilizing a Trusted Platform Module in the central gateway.
JOURNAL OF ADVANCED TRANSPORTATION
(2021)
Article
Computer Science, Information Systems
Ibrahim Ethem Bagci, Thomas Mcgrath, Christine Barthelmes, Scott Dean, Ramon Bernardo Gavito, Robert James Young, Utz Roedig
Summary: In this paper, the Resonant-Tunnelling Diodes (RTDs) are proposed as building blocks for Physical Unclonable Functions (PUFs) by translating the unique RTD current-voltage (I-V) spectrum into a robust digital representation. Analysis of 130 devices shows that RTDs are a viable PUF building block.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
(2021)
Proceedings Paper
Computer Science, Theory & Methods
Martin C. Bor, Angelos K. Marnerides, Andy Molineux, Steve Wattam, Utz Roedig
E-ENERGY'19: PROCEEDINGS OF THE 10TH ACM INTERNATIONAL CONFERENCE ON FUTURE ENERGY SYSTEMS
(2019)
Proceedings Paper
Automation & Control Systems
Povilas Marcinkevicius, Ibrahim Ethem Bagci, Nema M. Abdelazim, Christopher S. Woodhead, Robert J. Young, Utz Roedig
2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE)
(2019)