Related references
Note: Only part of the references are listed.
Article
Computer Science, Hardware & Architecture
Colin Boyd et al.
Summary: Forward security is crucial in ensuring that compromise of current entities does not impact the security of cryptographic primitives used in the past, especially given the capabilities of adversaries today. Despite its existence for over 30 years, understanding of forward security is hindered by new techniques and inconsistent terminology. Existing methods for achieving forward security are surveyed, with proposals for new definitions and terminology to unify the concept.
Article
Computer Science, Information Systems
Mohamed Amine Ferrag et al.
Summary: This article presents research challenges and a tutorial on the performance evaluation of blockchain-based security and privacy systems for IoT. The article reviews existing surveys, blockchain applications in IoT, consensus algorithms, security analysis techniques, performance metrics, and open challenges. The study provides insights into building and evaluating blockchain-based security and privacy systems and highlights future research opportunities.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Xu Yuan et al.
Summary: Blockchain technology has seen rapid advancement in various fields, particularly in large-scale IoT networks. Challenges arise when deploying IoT applications on blockchain systems due to limited storage, power, and computing capability of IoT devices, with consensus algorithms playing a significant role in ensuring system reliability and robustness.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
(2021)
Article
Computer Science, Information Systems
Lei Zhang
Summary: The paper proposes a key management scheme called DConBE for secure channel establishment in fog computing, allowing fog nodes to negotiate public encryption keys and decryption keys, achieving fog node dynamics, full collusion resistance, and statelessness.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2021)
Proceedings Paper
Computer Science, Information Systems
Matthew Weidner et al.
Summary: This paper discusses a secure group messaging protocol for decentralized networks, introducing the concept of decentralized continuous group key agreement (DCGKA) as a new cryptographic primitive. It proves the security and efficiency of the protocol, providing forward secrecy and post-compromise security in the face of device compromises.
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY
(2021)
Article
Computer Science, Information Systems
Euijong Lee et al.
Summary: There has been a rise in studies related to the Internet of Things in various fields, highlighting the importance of interoperability and security in achieving IoT system goals. International standards provide general methods to support interoperability and security, aiding in the development and management of systems efficiently. Adopting international standards is crucial to overcome barriers in IoT implementation.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2021)
Article
Computer Science, Information Systems
Shalitha Wijethilaka et al.
Summary: Network slicing is a key technology in 5G architecture that enables the realization of IoT, dividing the physical network into multiple logical networks with different characteristics to meet diverse networking demands. This survey provides a comprehensive analysis of network slicing's utilization in IoT, addressing technical challenges and discussing integration challenges and open research problems. Integration of other emerging technologies like blockchain and AI/ML in network slicing and IoT integration is also explored.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2021)
Article
Computer Science, Information Systems
Dinh C. Nguyen et al.
Summary: The Internet of Things and artificial intelligence are increasingly intertwined in our daily lives, with Federated Learning emerging as a distributed collaborative AI approach that can play a vital role in intelligent IoT applications. This article provides a comprehensive survey of the emerging applications of FL in IoT networks and highlights its potential in various fields, paving the way for future research directions.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2021)
Article
Computer Science, Information Systems
Anshul Anand et al.
Article
Computer Science, Hardware & Architecture
Mohamed Ali Kandi et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2020)
Article
Computer Science, Information Systems
Haowen Tan et al.
Review
Computer Science, Information Systems
Mehrdad Salimitari et al.
INTERNET OF THINGS
(2020)
Article
Computer Science, Information Systems
Muhammad Salek Ali et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2019)
Article
Computer Science, Information Systems
Yi-Hsuan Kung et al.
IEEE INTERNET OF THINGS JOURNAL
(2018)
Proceedings Paper
Computer Science, Theory & Methods
Katriel Cohn-Gordon et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18)
(2018)
Article
Computer Science, Information Systems
Konstantinos Christidis et al.