2022
DOI: 10.1007/s40747-022-00667-z
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

Abstract: The recent years have garnered huge attention towards the Internet of Things (IoT) because it enables its consumers to improve their lifestyles and professionally keep up with the technological advancements in the cyber-physical world. The IoT edge devices are heterogeneous in terms of the technology they are built on and the storage file formats used. These devices require highly secure modes of mutual authentication to authenticate each other before actually sending the data. Mutual authentication is a very … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(34 citation statements)
references
References 168 publications
0
34
0
Order By: Relevance
“…Once a transaction is recorded on the blockchain, it is immutable, meaning it cannot be altered or deleted. Additionally, the transparent nature of blockchain allows anyone to view the entire transaction history, promoting accountability and trust among network participants [5] . ISSN 2616-5775 Vol.…”
Section: Basics Of Blockchain Technologymentioning
confidence: 99%
“…Once a transaction is recorded on the blockchain, it is immutable, meaning it cannot be altered or deleted. Additionally, the transparent nature of blockchain allows anyone to view the entire transaction history, promoting accountability and trust among network participants [5] . ISSN 2616-5775 Vol.…”
Section: Basics Of Blockchain Technologymentioning
confidence: 99%
“…It is the monitoring of chat and communication that is helpful in keeping track [109]. It is useful in cyber security for authentication [110].To create geographically dispersed data and create a history model provenance and lineage tracking trusted A.I. [111].…”
Section: Qr Code Digital Watermarkinga Data Hiding Techniquementioning
confidence: 99%
“…11 For example, the malicious software of the scanning device may store a copy of the biometric template to replay later. 12,13 To address the issues related to non-authentic biometric authentication devices and to handle device tempering attacks, several authors like Shah et al 14 proposed a revolutionary Lightweight Continuous Device-to-Device Authentication (LCDA) protocol. The proposed protocol uses communication channel features and a configurable function to produce session keys that change on the fly, allowing for time-based continuous authentication of devices.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to the additive/subtractive functions provided by biometric authentication devices, some biometric authentication devices may have malicious software 11 . For example, the malicious software of the scanning device may store a copy of the biometric template to replay later 12,13 …”
Section: Introductionmentioning
confidence: 99%