Uncategorized

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing



  • Ray PP (2018) A survey on internet of things architectures. J King Saud Univ-Comput Inf Sci 30(3):291–319


    Google Scholar
     

  • HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H (2021) A survey on internet of things security: requirements, challenges, and solutions. Internet of Things 14:100129


    Google Scholar
     

  • Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wireless Pers Commun 58:49–69


    Google Scholar
     

  • Omolara AE, Alabdulatif A, Abiodun OI, Alawida M, Alabdulatif A, Arshad H et al (2022) The internet of things security: a survey encompassing unexplored areas and new insights. Comput & Secur 112:102494


    Google Scholar
     

  • Kumari S, Singh M, Singh R, Tewari H (2022) Post-quantum cryptography techniques for secure communication in resource-constrained internet of things devices: A comprehensive survey. Softw: Pract and Exper 52(10):2047–2076


    Google Scholar
     

  • Shah Z, Ullah I, Li H, Levula A, Khurshid K (2022) Blockchain based solutions to mitigate distributed denial of service (ddos) attacks in the internet of things (iot): a survey. Sensors 22(3):1094


    Google Scholar
     

  • Kumar A, Saha R, Conti M, Kumar G, Buchanan WJ, Kim TH (2022) A comprehensive survey of authentication methods in internet-of-things and its conjunctions. J Netw and Compt Appl 204:103414


    Google Scholar
     

  • Thabit F, Can O, Aljahdali AO, Al-Gaphari GH, Alkhzaimi HA (2023) A comprehensive literature survey of cryptography algorithms for improving the iot security, Internet of Things, 100759

  • Mathur S, Kalla A, Gür G, Bohra MK, Liyanage M (2023) A survey on role of blockchain for iot: applications and technical aspects. Comput Netw 227:109726


    Google Scholar
     

  • Gaurav A, Gupta BB, Panigrahi PK (2022) A comprehensive survey on machine learning approaches for malware detection in iot-based enterprise information system. Enterprise Inf Syst 17(3):2023764


    Google Scholar
     

  • Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, Lymberopoulos D (2022) A survey on security threats and countermeasures in internet of medical things (iomt). Trans on Emerg Telecommun Technol 33(6):e4049


    Google Scholar
     

  • Razzaq MA, Gill SH, Qureshi MA, Ullah S Security issues in the internet of things (iot): A comprehensive study, Int J Adv Comput Sci and Appl 8(6)

  • Alfandi O, Khanji S, Ahmad L, Khattak A (2021) A survey on boosting iot security and privacy through blockchain: exploration, requirements, and open issues. Clust Comput 24:37–55


    Google Scholar
     

  • Khan MA, Salah K (2018) Iot security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411


    Google Scholar
     

  • Dhillon PK, Kalra S (2017) Secure multi-factor remote user authentication scheme for internet of things environments. Int J Commun Syst 30(16):e3323


    Google Scholar
     

  • La Torre M, Dumay J, Rea MA (2018) Breaching intellectual capital: critical reflections on big data security. Meditari Accountancy Res 26(3):463–482


    Google Scholar
     

  • Kumar A, Jain V, Yadav A (2020) A new approach for security in cloud data storage for iot applications using hybrid cryptography technique, In: 2020 international conference on power electronics & IoT applications in renewable energy and its control (PARC). IEEE, pp 514–517

  • Yang P, Xiong N, Ren J (2020) Data security and privacy protection for cloud storage: a survey. IEEE Access 8:131723–131740


    Google Scholar
     

  • Steichen M, Fiz B, Norvill R, Shbair W, State R (2018) Blockchain-based, decentralized access control for ipfs, In: 2018 Ieee international conference on internet of things (iThings) and ieee green computing and communications (GreenCom) and ieee cyber, physical and social computing (CPSCom) and ieee smart data (SmartData). IEEE, pp 1499–1506

  • Raja Santhi A, Muthuswamy P (2022) Influence of blockchain technology in manufacturing supply chain and logistics. Logistics 6(1):15


    Google Scholar
     

  • Benzaïd C, Taleb T, Farooqi MZ (2021) Trust in 5g and beyond networks. IEEE Netw 35(3):212–222


    Google Scholar
     

  • Mall P, Amin R, Das AK, Leung MT, Choo K-KR (2022) Puf-based authentication and key agreement protocols for iot, wsns, and smart grids: a comprehensive survey. IEEE Internet Things J 9(11):8205–8228


    Google Scholar
     

  • Cherbal S, Benchetioui R (2023) Scpuak: smart card-based secure protocol for remote user authentication and key agreement. Comput Electr Eng 109:108759


    Google Scholar
     

  • Khraisat A, Alazab A (2021) A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 4:1–27


    Google Scholar
     

  • Rana M, Mamun Q, Islam R (2022) Lightweight cryptography in iot networks: a survey. Futur Gener Comput Syst 129:77–89


    Google Scholar
     

  • Ahanger TA, Aljumah A, Atiquzzaman M (2022) State-of-the-art survey of artificial intelligent techniques for iot security. Comput Netw 206:108771


    Google Scholar
     

  • Wu H, Han H, Wang X, Sun S (2020) Research on artificial intelligence enhancing internet of things security: a survey. Ieee Access 8:153826–153848


    Google Scholar
     

  • Fernández-Caramés TM (2019) From pre-quantum to post-quantum iot security: A survey on quantum-resistant cryptosystems for the internet of things. IEEE Internet Things J 7(7):6457–6480


    Google Scholar
     

  • Sadhu PK, Yanambaka VP, Abdelgawad A (2022) Internet of things: security and solutions survey. Sensors 22(19):7433


    Google Scholar
     

  • Mothukuri V, Khare P, Parizi RM, Pouriyeh S, Dehghantanha A, Srivastava G (2021) Federated-learning-based anomaly detection for iot security attacks. IEEE Internet Things J 9(4):2545–2554


    Google Scholar
     

  • Uprety A, Rawat DB (2020) Reinforcement learning for iot security: a comprehensive survey. IEEE Internet Things J 8(11):8693–8706


    Google Scholar
     

  • Mohanta BK, Satapathy U, Panda SS, Jena D (2019) A novel approach to solve security and privacy issues for iot applications using blockchain, In: 2019 International Conference on Information Technology (ICIT), IEEE, pp 394–399

  • Deogirikar J, Vidhate A (2017) Security attacks in iot: A survey, In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), IEEE, pp 32–37

  • Yong B, Wei W, Li K-C, Shen J, Zhou Q, Wozniak M, Połap D, Damaševičius R (2022) Ensemble machine learning approaches for webshell detection in internet of things environments. Trans Emerg Telecommun Technol 33(6):e4085


    Google Scholar
     

  • Gamage H, Weerasinghe H, Dias N (2020) A survey on blockchain technology concepts, applications, and issues. SN Comput Sci 1:1–15


    Google Scholar
     

  • Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends, In: 2017 IEEE international congress on big data (BigData congress). IEEE, pp 557–564

  • Alkhateeb A, Catal C, Kar G, Mishra A (2022) Hybrid blockchain platforms for the internet of things (iot): a systematic literature review. Sensors 22(4):1304


    Google Scholar
     

  • Huo R, Zeng S, Wang Z, Shang J, Chen W, Huang T, Wang S, Yu FR, Liu Y (2022) A comprehensive survey on blockchain in industrial internet of things: Motivations, research progresses, and future challenges. IEEE Commun Surveys & Tutorials 24(1):88–122


    Google Scholar
     

  • Kumar S, Raut RD, Agrawal N, Cheikhrouhou N, Sharma M, Daim T (2022) Integrated blockchain and internet of things in the food supply chain: adoption barriers. Technovation 118:102589


    Google Scholar
     

  • Wu Y, Wu Y, Cimen H, Vasquez JC, Guerrero JM (2022) P2p energy trading: blockchain-enabled p2p energy society with multi-scale flexibility services. Energy Rep 8:3614–3628


    Google Scholar
     

  • Sarker IH (2022) Ai-based modeling: techniques, applications and research issues towards automation, intelligent and smart systems. SN Comput Sci 3(2):158


    Google Scholar
     

  • Dalal KR (2020) Analysing the role of supervised and unsupervised machine learning in iot, In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, pp 75–79

  • Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) Iot security techniques based on machine learning: how do iot devices use ai to enhance security? IEEE Signal Process Mag 35(5):41–49


    Google Scholar
     

  • Nikam SS (2015) A comparative study of classification techniques in data mining algorithms. Oriental J Comput Sci and Technol 8(1):13–19


    Google Scholar
     

  • Mousavi SK, Ghaffari A, Besharat S, Afshari H (2021) Security of internet of things based on cryptographic algorithms: a survey. Wireless Netw 27:1515–1555


    Google Scholar
     

  • Jose DV, Vijyalakshmi A (2018) An overview of security in internet of things. Procedia Comput Sci 143:744–748


    Google Scholar
     

  • Almazrooie M, Samsudin A, Gutub AA-A, Salleh MS, Omar MA, Hassan SA (2020) Integrity verification for digital holy quran verses using cryptographic hash function and compression. J King Saud Univ-Comput and Inf Sci 32(1):24–34


    Google Scholar
     

  • Bernhardt C (2019) Quantum computing for everyone. Mit Press


    Google Scholar
     

  • Gill SS, Kumar A, Singh H, Singh M, Kaur K, Usman M, Buyya R (2022) Quantum computing: a taxonomy, systematic review and future directions. Software: Practice and Exper 52(1):66–114


    Google Scholar
     

  • Cusumano MA (2018) The business of quantum computing. Commun ACM 61(10):20–22


    Google Scholar
     

  • Bhatt AP, Sharma A (2019) Quantum cryptography for internet of things security. J Electr Sci and Technol 17(3):213–220


    Google Scholar
     

  • Broadbent A, Schaffner C (2016) Quantum cryptography beyond quantum key distribution. Des Codes Crypt 78:351–382

    MathSciNet 

    Google Scholar
     

  • Williams P, Dutta IK, Daoud H, Bayoumi M (2022) A survey on security in internet of things with a focus on the impact of emerging technologies. Internet of Things 19:100564


    Google Scholar
     

  • Corallo A, Lazoi M, Lezzi M, Luperto A (2022) Cybersecurity awareness in the context of the industrial internet of things: a systematic literature review. Comput Ind 137:103614


    Google Scholar
     

  • Shirvani MH, Masdari M (2022) A survey study on trust-based security in internet of things: Challenges and issues, Internet of Things, 100640

  • Swessi D, Idoudi H (2022) A survey on internet-of-things security: threats and emerging countermeasures. Wireless Pers Commun 124(2):1557–1592


    Google Scholar
     

  • Alzoubi YI, Al-Ahmad A, Kahtan H, Jaradat A (2022) Internet of things and blockchain integration: security, privacy, technical, and design challenges. Future Internet 14(7):216


    Google Scholar
     

  • Khan AA, Laghari AA, Shaikh ZA, Dacko-Pikiewicz Z, Kot S Internet of things (iot) security with blockchain technology: a state-of-the-art review, IEEE Access

  • Savithri G, Mohanta BK, Dehury MK (2022) A brief overview on security challenges and protocols in internet of things application, In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). IEEE, pp 1–7

  • Khan AR, Kashif M, Jhaveri RH, Raut R, Saba T, Bahaj SA (2022) Deep learning for intrusion detection and security of internet of things (iot): current analysis, challenges, and possible solutions, Security and Communication Networks

  • Sarker IH, Khan AI, Abushark YB, Alsolami F (2022) Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions, Mobile Networks and Applications, 1–17

  • Raimundo RJ, Rosário AT (2022) Cybersecurity in the internet of things in industrial management. Appl Sci 12(3):1598


    Google Scholar
     

  • Khan NA, Awang A, S. A. Karim BA Security in internet of things: A review, IEEE Access

  • Heidari A, Jabraeil Jamali MA (2022) Internet of things intrusion detection systems: A comprehensive review and future directions, Cluster Computing, 1–28

  • Issa W, Moustafa N, Turnbull B, Sohrabi N, Tari Z (2023) Blockchain-based federated learning for securing internet of things: a comprehensive survey. ACM Comput Surv 55(9):1–43


    Google Scholar
     

  • Kumar A, Bhushan B, Shriti S, Nand P (2022) Quantum computing for health care: a review on implementation trends and recent advances, Multimedia Technologies in the Internet of Things. Environment 3:23–40


    Google Scholar
     

  • Jahangeer A, Bazai SU, Aslam S, Marjan S, Anas M, Hashemi SH A review on the security of iot networks: From network layer’s perspective, IEEE Access

  • Taherdoost H (2023) Security and internet of things: benefits, challenges, and future perspectives. Electronics 12(8):1901


    Google Scholar
     

  • de Azambuja AJG, Plesker C, Schützer K, Anderl R, Schleich B, Almeida VR (2023) Artificial intelligence-based cyber security in the context of industry 4.0-a survey. Electronics 12(8):1920


    Google Scholar
     

  • Mangla C, Rani S, Qureshi NMF, Singh A (2023) Mitigating 5g security challenges for next-gen industry using quantum computing. J of King Saud Univ-Comput and Inf Sci 35(6):101334


    Google Scholar
     

  • Latif S, Idrees Z, Ahmad J, Zheng L, Zou Z (2021) A blockchain-based architecture for secure and trustworthy operations in the industrial internet of things. J Indus Inf Int 21:100190. https://doi.org/10.1016/j.jii.2020.100190

    Article 

    Google Scholar
     

  • Wadhwa S, Rani S, Kaur G, Koundal D, Zaguia A, Enbeyle W (2022) Heterofl blockchain approach-based security for cognitive internet of things, Wireless Communications and Mobile Computing

  • Wang J, Chen J, Ren Y, Sharma PK, Alfarraj O, Tolba A (2022) Data security storage mechanism based on blockchain industrial internet of things. Comput & Industrial Eng 164:107903


    Google Scholar
     

  • Agyekum KO-BO, Xia Q, Sifah EB, Cobblah CNA, Xia H, Gao J (2021) A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Syst J 16(1):1685–1696


    Google Scholar
     

  • De Caro A, Iovino V (2011) jpbc: Java pairing based cryptography, In: 2011 IEEE Symposium on Computers and Communications (ISCC). IEEE, pp 850–855

  • Chai B, Yan B, Yu J, Wang G (2021) Bhe-ac: a blockchain-based high-efficiency access control framework for internet of things, Personal and Ubiquitous Computing, 1–12

  • Rizzardi A, Sicari S, Miorandi D, Coen-Porisini A (2022) Securing the access control policies to the internet of things resources through permissioned blockchain. Concurrency and Comput: Pract and Exp 34(15):e6934


    Google Scholar
     

  • Ngabo D, Wang D, Iwendi C, Anajemba JH, Ajao LA, Biamba C (2021) Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things. Electronics 10(17):2110


    Google Scholar
     

  • Chaganti R, Varadarajan V, Gorantla VS, Gadekallu TR, Ravi V (2022) Blockchain-based cloud-enabled security monitoring using internet of things in smart agriculture. Future Internet 14(9):250


    Google Scholar
     

  • Honar Pajooh H, Rashid M, Alam F, Demidenko S (2021) Multi-layer blockchain-based security architecture for internet of things. Sensors 21(3):772


    Google Scholar
     

  • Dhar S, Khare A, Singh R (2022) Advanced security model for multimedia data sharing in internet of things, Trans Emerg Telecommun Technol, e4621

  • Ipfs: a decentralised cloud and file system for the blockchain environment (2020) https://www.opensourceforu.com/2020/08/ipfs-a-decentralised-cloud-and-file-system-for-the-blockchain-environment

  • Chentouf FZ, Bouchkaren S (2023) Security and privacy in smart city: a secure e-voting system based on blockchain. Intl J of Electr and Comput Eng 13(2):1848


    Google Scholar
     

  • Khan AA, Bourouis S, Kamruzzaman M, Hadjouni M, Shaikh ZA, Laghari AA, Elmannai H, Dhahbi S Data security in healthcare industrial internet of things with blockchain, IEEE Sensors Journal

  • Mihoub A, Fredj OB, Cheikhrouhou O, Derhab A, Krichen M (2022) Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Comput & Electrical Eng 98:107716


    Google Scholar
     

  • Yazdinejad A, Kazemi M, Parizi RM, Dehghantanha A, Karimipour H (2023) An ensemble deep learning model for cyber threat hunting in industrial internet of things. Digital Commun and Netw 9(1):101–110


    Google Scholar
     

  • Alkahtani H, Aldhyani TH (2021) Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity 2021:1–18


    Google Scholar
     

  • Tharewal S, Ashfaque MW, Banu SS, Uma P, Hassen SM, Shabaz M (2022) Intrusion detection system for industrial internet of things based on deep reinforcement learning. Wirel Commun Mob Comput 2022:1–8


    Google Scholar
     

  • Mazhar MS, Saleem Y, Almogren A, Arshad J, Jaffery MH, Rehman AU, Shafiq M, Hamam H (2022) Forensic analysis on internet of things (iot) device using machine-to-machine (m2m) framework. Electronics 11(7):1126


    Google Scholar
     

  • Javeed D, Gao T, Khan MT, Ahmad I (2021) A hybrid deep learning-driven sdn enabled mechanism for secure communication in internet of things (iot). Sensors 21(14):4884


    Google Scholar
     

  • Liu X, Yu W, Liang F, Griffith D, Golmie N (2021) On deep reinforcement learning security for industrial internet of things. Comput Commun 168:20–32


    Google Scholar
     

  • Saba T, Sadad T, Rehman A, Mehmood Z, Javaid Q (2021) Intrusion detection system through advance machine learning for the internet of things networks. IT Professional 23(2):58–64


    Google Scholar
     

  • Sahu AK, Sharma S, Tanveer M, Raja R (2021) Internet of things attack detection using hybrid deep learning model. Comput Commun 176:146–154


    Google Scholar
     

  • Hasan T, Malik J, Bibi I, Khan WU, Al-Wesabi FN, Dev K, Huang G Securing industrial internet of things against botnet attacks using hybrid deep learning approach, IEEE Trans on Netw Sci and Eng

  • Jothi B, Pushpalatha M (2023) Wils-trs-a novel optimized deep learning based intrusion detection framework for iot networks. Pers Ubiquit Comput 27(3):1285–1301


    Google Scholar
     

  • Musleh D, Alotaibi M, Alhaidari F, Rahman A, Mohammad RM (2023) Intrusion detection system using feature extraction with machine learning algorithms in iot. J Sens Actuator Netw 12(2):29


    Google Scholar
     

  • Xu H, Sun Z, Cao Y, Bilal H (2023) A data-driven approach for intrusion and anomaly detection using automated machine learning for the internet of things, Soft Computing, 1–13

  • Khalifa M, Algarni F, Khan MA, Ullah A, Aloufi K (2021) A lightweight cryptography (lwc) framework to secure memory heap in internet of things. Alex Eng J 60(1):1489–1497


    Google Scholar
     

  • Liu X, Wang X, Yu K, Yang X, Ma W, Li G, Zhao X (2022) Secure data aggregation aided by privacy preserving in internet of things, Wireless Communications and Mobile Computing

  • Ullah I, Alkhalifah A, Althobaiti MM, Al-Wesabi FN, Hilal AM, Khan MA, Ming-Tai Wu J (2022) Certificate-based signature scheme for industrial internet of things using hyperelliptic curve cryptography, Wireless Communications and Mobile Computing

  • Khan J, Khan GA, Li JP, AlAjmi MF, Haq AU, Khan S, Ahmad N, Parveen S, Shahid M, Ahmad S et al (2022) Secure smart healthcare monitoring in industrial internet of things (iiot) ecosystem with cosine function hybrid chaotic map encryption, Scientific Programming

  • Jerbi W, Guermazi A, Cheikhrouhou O, Trabelsi H (2021) Coopecc: a collaborative cryptographic mechanism for the internet of things. J of Sens 2021:1–8


    Google Scholar
     

  • Chanal PM, Kakkasageri MS (2021) Preserving data confidentiality in internet of things. SN Comput Sci 2(1):53


    Google Scholar
     

  • Unal D, Al-Ali A, Catak FO, Hammoudeh M (2021) A secure and efficient internet of things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Futur Gener Comput Syst 125:433–445


    Google Scholar
     

  • Liu X, Yang X, Luo Y, Zhang Q (2021) Verifiable multikeyword search encryption scheme with anonymous key generation for medical internet of things. IEEE Internet Things J 9(22):22315–22326


    Google Scholar
     

  • Sahmi I, Abdellaoui A, Mazri T, Hmina N Mqtt-present: Approach to secure internet of things applications using mqtt protocol., Int J of Electr & Comput Eng (2088-8708) 11 (5)

  • Gong B, Wu Y, Wang Q, Ren Y-H, Guo C (2022) A secure and lightweight certificateless hybrid signcryption scheme for internet of things. Futur Gener Comput Syst 127:23–30


    Google Scholar
     

  • Mousavi SK, Ghaffari A (2021) Data cryptography in the internet of things using the artificial bee colony algorithm in a smart irrigation system. J Inf Security and Appl 61:102945


    Google Scholar
     

  • Bettoumi B, Bouallegue R (2021) Lc-dex: Lightweight and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in hip-based internet of things. Sensors 21(21):7348


    Google Scholar
     

  • Kumari KS, Priya JL, Pravallika B, Bhargavi KM, Priya G (2023) Two stage secure medical data transmission for iot based e-health application. Turkish J of Comput and Math Educ (TURCOMAT) 14(2):352–364


    Google Scholar
     

  • Al-Zubaidie M (2023) Implication of lightweight and robust hash function to support key exchange in health sensor networks. Symmetry 15(1):152


    Google Scholar
     

  • Abd El-Aziz RM, Taloba AI, Alghamdi FA (2022) Quantum computing optimization technique for iot platform using modified deep residual approach. Alex Eng J 61(12):12497–12509


    Google Scholar
     

  • Shahid F, Khan A, Jeon G (2020) Post-quantum distributed ledger for internet of things. Comput & Electr Eng 83:106581


    Google Scholar
     

  • Yi H, Chi R, Huang X, Cai X, Nie Z (2022) Improving security of internet of vehicles based on post-quantum signatures with systolic divisions. ACM Trans Internet Technol 22(4):1–15


    Google Scholar
     

  • Qu Z, Wang K, Zheng M (2021) Secure quantum fog computing model based on blind quantum computation, J of Ambient Intell and Humanized Comput, 1–11

  • Shen Y, Tang X, Zhang X, Zhou Y, Zou H (2022) A flexible continuous-wave quantum cryptography scheme with zero-trust security for internet of things. Int J Distrib Sens Netw 18(11):15501329221136978


    Google Scholar
     

  • Akleylek S, Soysaldı M, Lee W-K, Hwang SO, Wong DC-K (2020) Novel postquantum mq-based signature scheme for internet of things with parallel implementation. IEEE Internet Things J 8(8):6983–6994


    Google Scholar
     

  • Chikouche N, Cayrel P-L, Mboup EHM, Boidje BO (2019) A privacy-preserving code-based authentication protocol for internet of things. J Supercomput 75:8231–8261


    Google Scholar
     

  • Abd El-Latif AA, Abd-El-Atty B, Mazurczyk W, Fung C, Venegas-Andraca SE (2020) Secure data encryption based on quantum walks for 5g internet of things scenario. IEEE Trans Netw Serv Manage 17(1):118–131


    Google Scholar
     

  • Chen L, Chen Q, Zhao M, Chen J, Liu S, Zhao Y (2022) Ddka-qkdn: dynamic on-demand key allocation scheme for quantum internet of things secured by qkd network. Entropy 24(2):149

    MathSciNet 

    Google Scholar
     

  • Althobaiti OS, Dohler M (2021) Quantum-resistant cryptography for the internet of things based on location-based lattices. IEEE Access 9:133185–133203


    Google Scholar
     

  • Shamshad S, Riaz F, Riaz R, Rizvi SS, Abdulla S (2022) An enhanced architecture to resolve public-key cryptographic issues in the internet of things (iot), employing quantum computing supremacy. Sensors 22(21):8151


    Google Scholar
     

  • Xu D, Liu L, Zhang N, Dong M, Leung VC, Ritcey JA Nested hash access with post quantum encryption for mission-critical iot communications, IEEE Internet of Things J

  • Xi P, Zhang X, Wang L, Liu W, Peng S (2022) A review of blockchain-based secure sharing of healthcare data. Appl Sci 12(15):7912


    Google Scholar
     

  • Zheng Z, Xie S, Dai H-N, Chen W, Chen X, Weng J, Imran M (2020) An overview on smart contracts: challenges, advances and platforms. Futur Gener Comput Syst 105:475–491


    Google Scholar
     

  • Peng L, Feng W, Yan Z, Li Y, Zhou X, Shimizu S (2021) Privacy preservation in permissionless blockchain: a survey. Digital Commun and Netw 7(3):295–307


    Google Scholar
     

  • Dib O, Brousmiche K-L, Durand A, Thea E, Hamida EB (2018) Consortium blockchains: overview, applications and challenges. Int J Adv Telecommun 11(1):51–64


    Google Scholar
     

  • Mamun Q (2022) Blockchain technology in the future of healthcare. Smart Health 23:100223


    Google Scholar
     

  • Pabitha P, Priya JC, Praveen R, Jagatheswari S (2023) Modchain: a hybridized secure and scaling blockchain framework for iot environment. Int J Inf Technol 15(3):1741–1754


    Google Scholar
     

  • Helliar CV, Crawford L, Rocca L, Teodori C, Veneziani M (2020) Permissionless and permissioned blockchain diffusion. Int J Inf Manage 54:102136


    Google Scholar
     

  • Kushwaha SS, Joshi S, Singh D, Kaur M, Lee H-N (2022) Ethereum smart contract analysis tools: a systematic review. IEEE Access 10:57037–57062


    Google Scholar
     

  • Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (iot) security. IEEE Commun Surv & Tutorials 22(3):1646–1685


    Google Scholar
     

  • Farooq U, Tariq N, Asim M, Baker T, Al-Shamma’a A (2022) Machine learning and the internet of things security: solutions and open challenges. J Parallel and Distributed Comput 162:89–104


    Google Scholar
     

  • Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in iot security: current solutions and future challenges. IEEE Commun Surveys & Tutorials 22(3):1686–1721


    Google Scholar
     

  • Alzubaidi L, Zhang J, Humaidi AJ, Al-Dujaili A, Duan Y, Al-Shamma O, Santamaría J, Fadhel MA, Al-Amidie M, Farhan L (2021) Review of deep learning: concepts, cnn architectures, challenges, applications, future directions. J big Data 8:1–74


    Google Scholar
     

  • Thakkar A, Lohiya R (2021) A review on machine learning and deep learning perspectives of ids for iot: recent updates, security issues, and challenges. Archives of Comput Methods in Eng 28:3211–3243


    Google Scholar
     

  • Goldblum M, Tsipras D, Xie C, Chen X, Schwarzschild A, Song D, dry A, Li B, Goldstein T (2022) Dataset security for machine learning: data poisoning, backdoor attacks, and defenses. IEEE Trans Pattern Anal Mach Intell 45(2):1563–1580


    Google Scholar
     

  • Ahmad R, Alsmadi I (2021) Machine learning approaches to iot security: a systematic literature review. Internet of Things 14:100365


    Google Scholar
     

  • Ammar M, Washha M, Ramabhadran GS, Crispo B (2018) slimiot: Scalable lightweight attestation protocol for the internet of things, In: 2018 IEEE Conference on Dependable and Secure Computing (DSC), IEEE, pp 1–8

  • Fang D, Qian Y, Hu RQ (2020) A flexible and efficient authentication and secure data transmission scheme for iot applications. IEEE Internet Things J 7(4):3474–3484


    Google Scholar
     

  • Dhanda SS, Singh B, Jindal P (2020) Lightweight cryptography: a solution to secure iot. Wireless Pers Commun 112:1947–1980


    Google Scholar
     

  • Lo’Ai AT, Somani TF (2016) More secure internet of things using robust encryption algorithms against side channel attacks, In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). IEEE, pp 1–6

  • Kumar A, Garhwal S (2021) State-of-the-art survey of quantum cryptography. Arch Comput Methods in Eng 28:3831–3868

    MathSciNet 

    Google Scholar
     

  • Chowdhury S, Covic A, Acharya RY, Dupee S, Ganji F, Forte D (2021) Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions, J of Cryptogr Eng, 1–37

  • Wang H-W, Tsai C-W, Lin J, Yang C-W (2022) Authenticated semi-quantum key distribution protocol based on w states. Sensors 22(13):4998


    Google Scholar
     

  • Kumar A, Ottaviani C, Gill SS, Buyya R (2022) Securing the future internet of things with post-quantum cryptography. Secur and Privacy 5(2):e200


    Google Scholar
     

  • Bassi R, Zhang R, Gatto A, Tornatore M, Verticale G (2023) Quantum key distribution with trusted relay using an etsi-compliant software-defined controller, In: 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), IEEE, pp 1–7

  • Zeydan E, Turk Y, Aksoy B, Ozturk SB (2022) Recent advances in post-quantum cryptography for networks: A survey, In: 2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ). IEEE, pp 1–8



  • Source link

    Leave a Reply

    Your email address will not be published. Required fields are marked *