Now showing items 1-10 of 11
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
We review the state of the art of privacypreserving schemes for ad hoc social networks including mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically, we select and examine in-detail 33 ...
Security and Privacy in Fog Computing: Challenges
Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. ...
Blockchain Technologies for the Internet of Things: Research Issues and Challenges
This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain ...
Cyber security of critical infrastructures
Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved ...
Authentication Protocols for Internet of Things: A Comprehensive Survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are ...
Blockchain and Random Subspace Learning-based IDS for SDN-enabled Industrial IoT Security
The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies ...
DeliveryCoin: An IDS and Blockchain-based Delivery Framework for Drone-Delivered Services
In this paper, we propose an intrusion detection system (IDS) and Blockchain-based delivery framework, called DeliveryCoin, for drone-delivered services. The DeliveryCoin framework consists of four phases, including system ...
DeepCoin: A Novel Deep learning and Blockchain-based Energy Exchange Framework for Smart Grids
(IEEE Transactions on Engineering Management, 2019-07-09)
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues
This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for ...
Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed
Security of Critical National Infrastructures (CNI) is one of the major concerns tocountries both in a European and in a worldwide level. Training on scenarios thatinvolve such systems is important to the effective handling ...