Ray PP (2018) A survey on internet of things architectures. J King Saud Univ-Comput Inf Sci 30(3):291–319
HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H (2021) A survey on internet of things security: requirements, challenges, and solutions. Internet of Things 14:100129
Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wireless Pers Commun 58:49–69
Omolara AE, Alabdulatif A, Abiodun OI, Alawida M, Alabdulatif A, Arshad H et al (2022) The internet of things security: a survey encompassing unexplored areas and new insights. Comput & Secur 112:102494
Kumari S, Singh M, Singh R, Tewari H (2022) Post-quantum cryptography techniques for secure communication in resource-constrained internet of things devices: A comprehensive survey. Softw: Pract and Exper 52(10):2047–2076
Shah Z, Ullah I, Li H, Levula A, Khurshid K (2022) Blockchain based solutions to mitigate distributed denial of service (ddos) attacks in the internet of things (iot): a survey. Sensors 22(3):1094
Kumar A, Saha R, Conti M, Kumar G, Buchanan WJ, Kim TH (2022) A comprehensive survey of authentication methods in internet-of-things and its conjunctions. J Netw and Compt Appl 204:103414
Thabit F, Can O, Aljahdali AO, Al-Gaphari GH, Alkhzaimi HA (2023) A comprehensive literature survey of cryptography algorithms for improving the iot security, Internet of Things, 100759
Mathur S, Kalla A, Gür G, Bohra MK, Liyanage M (2023) A survey on role of blockchain for iot: applications and technical aspects. Comput Netw 227:109726
Gaurav A, Gupta BB, Panigrahi PK (2022) A comprehensive survey on machine learning approaches for malware detection in iot-based enterprise information system. Enterprise Inf Syst 17(3):2023764
Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, Lymberopoulos D (2022) A survey on security threats and countermeasures in internet of medical things (iomt). Trans on Emerg Telecommun Technol 33(6):e4049
Razzaq MA, Gill SH, Qureshi MA, Ullah S Security issues in the internet of things (iot): A comprehensive study, Int J Adv Comput Sci and Appl 8(6)
Alfandi O, Khanji S, Ahmad L, Khattak A (2021) A survey on boosting iot security and privacy through blockchain: exploration, requirements, and open issues. Clust Comput 24:37–55
Khan MA, Salah K (2018) Iot security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411
Dhillon PK, Kalra S (2017) Secure multi-factor remote user authentication scheme for internet of things environments. Int J Commun Syst 30(16):e3323
La Torre M, Dumay J, Rea MA (2018) Breaching intellectual capital: critical reflections on big data security. Meditari Accountancy Res 26(3):463–482
Kumar A, Jain V, Yadav A (2020) A new approach for security in cloud data storage for iot applications using hybrid cryptography technique, In: 2020 international conference on power electronics & IoT applications in renewable energy and its control (PARC). IEEE, pp 514–517
Yang P, Xiong N, Ren J (2020) Data security and privacy protection for cloud storage: a survey. IEEE Access 8:131723–131740
Steichen M, Fiz B, Norvill R, Shbair W, State R (2018) Blockchain-based, decentralized access control for ipfs, In: 2018 Ieee international conference on internet of things (iThings) and ieee green computing and communications (GreenCom) and ieee cyber, physical and social computing (CPSCom) and ieee smart data (SmartData). IEEE, pp 1499–1506
Raja Santhi A, Muthuswamy P (2022) Influence of blockchain technology in manufacturing supply chain and logistics. Logistics 6(1):15
Benzaïd C, Taleb T, Farooqi MZ (2021) Trust in 5g and beyond networks. IEEE Netw 35(3):212–222
Mall P, Amin R, Das AK, Leung MT, Choo K-KR (2022) Puf-based authentication and key agreement protocols for iot, wsns, and smart grids: a comprehensive survey. IEEE Internet Things J 9(11):8205–8228
Cherbal S, Benchetioui R (2023) Scpuak: smart card-based secure protocol for remote user authentication and key agreement. Comput Electr Eng 109:108759
Khraisat A, Alazab A (2021) A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 4:1–27
Rana M, Mamun Q, Islam R (2022) Lightweight cryptography in iot networks: a survey. Futur Gener Comput Syst 129:77–89
Ahanger TA, Aljumah A, Atiquzzaman M (2022) State-of-the-art survey of artificial intelligent techniques for iot security. Comput Netw 206:108771
Wu H, Han H, Wang X, Sun S (2020) Research on artificial intelligence enhancing internet of things security: a survey. Ieee Access 8:153826–153848
Fernández-Caramés TM (2019) From pre-quantum to post-quantum iot security: A survey on quantum-resistant cryptosystems for the internet of things. IEEE Internet Things J 7(7):6457–6480
Sadhu PK, Yanambaka VP, Abdelgawad A (2022) Internet of things: security and solutions survey. Sensors 22(19):7433
Mothukuri V, Khare P, Parizi RM, Pouriyeh S, Dehghantanha A, Srivastava G (2021) Federated-learning-based anomaly detection for iot security attacks. IEEE Internet Things J 9(4):2545–2554
Uprety A, Rawat DB (2020) Reinforcement learning for iot security: a comprehensive survey. IEEE Internet Things J 8(11):8693–8706
Mohanta BK, Satapathy U, Panda SS, Jena D (2019) A novel approach to solve security and privacy issues for iot applications using blockchain, In: 2019 International Conference on Information Technology (ICIT), IEEE, pp 394–399
Deogirikar J, Vidhate A (2017) Security attacks in iot: A survey, In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), IEEE, pp 32–37
Yong B, Wei W, Li K-C, Shen J, Zhou Q, Wozniak M, Połap D, Damaševičius R (2022) Ensemble machine learning approaches for webshell detection in internet of things environments. Trans Emerg Telecommun Technol 33(6):e4085
Gamage H, Weerasinghe H, Dias N (2020) A survey on blockchain technology concepts, applications, and issues. SN Comput Sci 1:1–15
Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends, In: 2017 IEEE international congress on big data (BigData congress). IEEE, pp 557–564
Alkhateeb A, Catal C, Kar G, Mishra A (2022) Hybrid blockchain platforms for the internet of things (iot): a systematic literature review. Sensors 22(4):1304
Huo R, Zeng S, Wang Z, Shang J, Chen W, Huang T, Wang S, Yu FR, Liu Y (2022) A comprehensive survey on blockchain in industrial internet of things: Motivations, research progresses, and future challenges. IEEE Commun Surveys & Tutorials 24(1):88–122
Kumar S, Raut RD, Agrawal N, Cheikhrouhou N, Sharma M, Daim T (2022) Integrated blockchain and internet of things in the food supply chain: adoption barriers. Technovation 118:102589
Wu Y, Wu Y, Cimen H, Vasquez JC, Guerrero JM (2022) P2p energy trading: blockchain-enabled p2p energy society with multi-scale flexibility services. Energy Rep 8:3614–3628
Sarker IH (2022) Ai-based modeling: techniques, applications and research issues towards automation, intelligent and smart systems. SN Comput Sci 3(2):158
Dalal KR (2020) Analysing the role of supervised and unsupervised machine learning in iot, In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, pp 75–79
Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) Iot security techniques based on machine learning: how do iot devices use ai to enhance security? IEEE Signal Process Mag 35(5):41–49
Nikam SS (2015) A comparative study of classification techniques in data mining algorithms. Oriental J Comput Sci and Technol 8(1):13–19
Mousavi SK, Ghaffari A, Besharat S, Afshari H (2021) Security of internet of things based on cryptographic algorithms: a survey. Wireless Netw 27:1515–1555
Jose DV, Vijyalakshmi A (2018) An overview of security in internet of things. Procedia Comput Sci 143:744–748
Almazrooie M, Samsudin A, Gutub AA-A, Salleh MS, Omar MA, Hassan SA (2020) Integrity verification for digital holy quran verses using cryptographic hash function and compression. J King Saud Univ-Comput and Inf Sci 32(1):24–34
Bernhardt C (2019) Quantum computing for everyone. Mit Press
Gill SS, Kumar A, Singh H, Singh M, Kaur K, Usman M, Buyya R (2022) Quantum computing: a taxonomy, systematic review and future directions. Software: Practice and Exper 52(1):66–114
Cusumano MA (2018) The business of quantum computing. Commun ACM 61(10):20–22
Bhatt AP, Sharma A (2019) Quantum cryptography for internet of things security. J Electr Sci and Technol 17(3):213–220
Broadbent A, Schaffner C (2016) Quantum cryptography beyond quantum key distribution. Des Codes Crypt 78:351–382
Williams P, Dutta IK, Daoud H, Bayoumi M (2022) A survey on security in internet of things with a focus on the impact of emerging technologies. Internet of Things 19:100564
Corallo A, Lazoi M, Lezzi M, Luperto A (2022) Cybersecurity awareness in the context of the industrial internet of things: a systematic literature review. Comput Ind 137:103614
Shirvani MH, Masdari M (2022) A survey study on trust-based security in internet of things: Challenges and issues, Internet of Things, 100640
Swessi D, Idoudi H (2022) A survey on internet-of-things security: threats and emerging countermeasures. Wireless Pers Commun 124(2):1557–1592
Alzoubi YI, Al-Ahmad A, Kahtan H, Jaradat A (2022) Internet of things and blockchain integration: security, privacy, technical, and design challenges. Future Internet 14(7):216
Khan AA, Laghari AA, Shaikh ZA, Dacko-Pikiewicz Z, Kot S Internet of things (iot) security with blockchain technology: a state-of-the-art review, IEEE Access
Savithri G, Mohanta BK, Dehury MK (2022) A brief overview on security challenges and protocols in internet of things application, In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). IEEE, pp 1–7
Khan AR, Kashif M, Jhaveri RH, Raut R, Saba T, Bahaj SA (2022) Deep learning for intrusion detection and security of internet of things (iot): current analysis, challenges, and possible solutions, Security and Communication Networks
Sarker IH, Khan AI, Abushark YB, Alsolami F (2022) Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions, Mobile Networks and Applications, 1–17
Raimundo RJ, Rosário AT (2022) Cybersecurity in the internet of things in industrial management. Appl Sci 12(3):1598
Khan NA, Awang A, S. A. Karim BA Security in internet of things: A review, IEEE Access
Heidari A, Jabraeil Jamali MA (2022) Internet of things intrusion detection systems: A comprehensive review and future directions, Cluster Computing, 1–28
Issa W, Moustafa N, Turnbull B, Sohrabi N, Tari Z (2023) Blockchain-based federated learning for securing internet of things: a comprehensive survey. ACM Comput Surv 55(9):1–43
Kumar A, Bhushan B, Shriti S, Nand P (2022) Quantum computing for health care: a review on implementation trends and recent advances, Multimedia Technologies in the Internet of Things. Environment 3:23–40
Jahangeer A, Bazai SU, Aslam S, Marjan S, Anas M, Hashemi SH A review on the security of iot networks: From network layer’s perspective, IEEE Access
Taherdoost H (2023) Security and internet of things: benefits, challenges, and future perspectives. Electronics 12(8):1901
de Azambuja AJG, Plesker C, Schützer K, Anderl R, Schleich B, Almeida VR (2023) Artificial intelligence-based cyber security in the context of industry 4.0-a survey. Electronics 12(8):1920
Mangla C, Rani S, Qureshi NMF, Singh A (2023) Mitigating 5g security challenges for next-gen industry using quantum computing. J of King Saud Univ-Comput and Inf Sci 35(6):101334
Latif S, Idrees Z, Ahmad J, Zheng L, Zou Z (2021) A blockchain-based architecture for secure and trustworthy operations in the industrial internet of things. J Indus Inf Int 21:100190. https://doi.org/10.1016/j.jii.2020.100190
Wadhwa S, Rani S, Kaur G, Koundal D, Zaguia A, Enbeyle W (2022) Heterofl blockchain approach-based security for cognitive internet of things, Wireless Communications and Mobile Computing
Wang J, Chen J, Ren Y, Sharma PK, Alfarraj O, Tolba A (2022) Data security storage mechanism based on blockchain industrial internet of things. Comput & Industrial Eng 164:107903
Agyekum KO-BO, Xia Q, Sifah EB, Cobblah CNA, Xia H, Gao J (2021) A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Syst J 16(1):1685–1696
De Caro A, Iovino V (2011) jpbc: Java pairing based cryptography, In: 2011 IEEE Symposium on Computers and Communications (ISCC). IEEE, pp 850–855
Chai B, Yan B, Yu J, Wang G (2021) Bhe-ac: a blockchain-based high-efficiency access control framework for internet of things, Personal and Ubiquitous Computing, 1–12
Rizzardi A, Sicari S, Miorandi D, Coen-Porisini A (2022) Securing the access control policies to the internet of things resources through permissioned blockchain. Concurrency and Comput: Pract and Exp 34(15):e6934
Ngabo D, Wang D, Iwendi C, Anajemba JH, Ajao LA, Biamba C (2021) Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things. Electronics 10(17):2110
Chaganti R, Varadarajan V, Gorantla VS, Gadekallu TR, Ravi V (2022) Blockchain-based cloud-enabled security monitoring using internet of things in smart agriculture. Future Internet 14(9):250
Honar Pajooh H, Rashid M, Alam F, Demidenko S (2021) Multi-layer blockchain-based security architecture for internet of things. Sensors 21(3):772
Dhar S, Khare A, Singh R (2022) Advanced security model for multimedia data sharing in internet of things, Trans Emerg Telecommun Technol, e4621
Ipfs: a decentralised cloud and file system for the blockchain environment (2020) https://www.opensourceforu.com/2020/08/ipfs-a-decentralised-cloud-and-file-system-for-the-blockchain-environment
Chentouf FZ, Bouchkaren S (2023) Security and privacy in smart city: a secure e-voting system based on blockchain. Intl J of Electr and Comput Eng 13(2):1848
Khan AA, Bourouis S, Kamruzzaman M, Hadjouni M, Shaikh ZA, Laghari AA, Elmannai H, Dhahbi S Data security in healthcare industrial internet of things with blockchain, IEEE Sensors Journal
Mihoub A, Fredj OB, Cheikhrouhou O, Derhab A, Krichen M (2022) Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Comput & Electrical Eng 98:107716
Yazdinejad A, Kazemi M, Parizi RM, Dehghantanha A, Karimipour H (2023) An ensemble deep learning model for cyber threat hunting in industrial internet of things. Digital Commun and Netw 9(1):101–110
Alkahtani H, Aldhyani TH (2021) Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity 2021:1–18
Tharewal S, Ashfaque MW, Banu SS, Uma P, Hassen SM, Shabaz M (2022) Intrusion detection system for industrial internet of things based on deep reinforcement learning. Wirel Commun Mob Comput 2022:1–8
Mazhar MS, Saleem Y, Almogren A, Arshad J, Jaffery MH, Rehman AU, Shafiq M, Hamam H (2022) Forensic analysis on internet of things (iot) device using machine-to-machine (m2m) framework. Electronics 11(7):1126
Javeed D, Gao T, Khan MT, Ahmad I (2021) A hybrid deep learning-driven sdn enabled mechanism for secure communication in internet of things (iot). Sensors 21(14):4884
Liu X, Yu W, Liang F, Griffith D, Golmie N (2021) On deep reinforcement learning security for industrial internet of things. Comput Commun 168:20–32
Saba T, Sadad T, Rehman A, Mehmood Z, Javaid Q (2021) Intrusion detection system through advance machine learning for the internet of things networks. IT Professional 23(2):58–64
Sahu AK, Sharma S, Tanveer M, Raja R (2021) Internet of things attack detection using hybrid deep learning model. Comput Commun 176:146–154
Hasan T, Malik J, Bibi I, Khan WU, Al-Wesabi FN, Dev K, Huang G Securing industrial internet of things against botnet attacks using hybrid deep learning approach, IEEE Trans on Netw Sci and Eng
Jothi B, Pushpalatha M (2023) Wils-trs-a novel optimized deep learning based intrusion detection framework for iot networks. Pers Ubiquit Comput 27(3):1285–1301
Musleh D, Alotaibi M, Alhaidari F, Rahman A, Mohammad RM (2023) Intrusion detection system using feature extraction with machine learning algorithms in iot. J Sens Actuator Netw 12(2):29
Xu H, Sun Z, Cao Y, Bilal H (2023) A data-driven approach for intrusion and anomaly detection using automated machine learning for the internet of things, Soft Computing, 1–13
Khalifa M, Algarni F, Khan MA, Ullah A, Aloufi K (2021) A lightweight cryptography (lwc) framework to secure memory heap in internet of things. Alex Eng J 60(1):1489–1497
Liu X, Wang X, Yu K, Yang X, Ma W, Li G, Zhao X (2022) Secure data aggregation aided by privacy preserving in internet of things, Wireless Communications and Mobile Computing
Ullah I, Alkhalifah A, Althobaiti MM, Al-Wesabi FN, Hilal AM, Khan MA, Ming-Tai Wu J (2022) Certificate-based signature scheme for industrial internet of things using hyperelliptic curve cryptography, Wireless Communications and Mobile Computing
Khan J, Khan GA, Li JP, AlAjmi MF, Haq AU, Khan S, Ahmad N, Parveen S, Shahid M, Ahmad S et al (2022) Secure smart healthcare monitoring in industrial internet of things (iiot) ecosystem with cosine function hybrid chaotic map encryption, Scientific Programming
Jerbi W, Guermazi A, Cheikhrouhou O, Trabelsi H (2021) Coopecc: a collaborative cryptographic mechanism for the internet of things. J of Sens 2021:1–8
Chanal PM, Kakkasageri MS (2021) Preserving data confidentiality in internet of things. SN Comput Sci 2(1):53
Unal D, Al-Ali A, Catak FO, Hammoudeh M (2021) A secure and efficient internet of things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Futur Gener Comput Syst 125:433–445
Liu X, Yang X, Luo Y, Zhang Q (2021) Verifiable multikeyword search encryption scheme with anonymous key generation for medical internet of things. IEEE Internet Things J 9(22):22315–22326
Sahmi I, Abdellaoui A, Mazri T, Hmina N Mqtt-present: Approach to secure internet of things applications using mqtt protocol., Int J of Electr & Comput Eng (2088-8708) 11 (5)
Gong B, Wu Y, Wang Q, Ren Y-H, Guo C (2022) A secure and lightweight certificateless hybrid signcryption scheme for internet of things. Futur Gener Comput Syst 127:23–30
Mousavi SK, Ghaffari A (2021) Data cryptography in the internet of things using the artificial bee colony algorithm in a smart irrigation system. J Inf Security and Appl 61:102945
Bettoumi B, Bouallegue R (2021) Lc-dex: Lightweight and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in hip-based internet of things. Sensors 21(21):7348
Kumari KS, Priya JL, Pravallika B, Bhargavi KM, Priya G (2023) Two stage secure medical data transmission for iot based e-health application. Turkish J of Comput and Math Educ (TURCOMAT) 14(2):352–364
Al-Zubaidie M (2023) Implication of lightweight and robust hash function to support key exchange in health sensor networks. Symmetry 15(1):152
Abd El-Aziz RM, Taloba AI, Alghamdi FA (2022) Quantum computing optimization technique for iot platform using modified deep residual approach. Alex Eng J 61(12):12497–12509
Shahid F, Khan A, Jeon G (2020) Post-quantum distributed ledger for internet of things. Comput & Electr Eng 83:106581
Yi H, Chi R, Huang X, Cai X, Nie Z (2022) Improving security of internet of vehicles based on post-quantum signatures with systolic divisions. ACM Trans Internet Technol 22(4):1–15
Qu Z, Wang K, Zheng M (2021) Secure quantum fog computing model based on blind quantum computation, J of Ambient Intell and Humanized Comput, 1–11
Shen Y, Tang X, Zhang X, Zhou Y, Zou H (2022) A flexible continuous-wave quantum cryptography scheme with zero-trust security for internet of things. Int J Distrib Sens Netw 18(11):15501329221136978
Akleylek S, Soysaldı M, Lee W-K, Hwang SO, Wong DC-K (2020) Novel postquantum mq-based signature scheme for internet of things with parallel implementation. IEEE Internet Things J 8(8):6983–6994
Chikouche N, Cayrel P-L, Mboup EHM, Boidje BO (2019) A privacy-preserving code-based authentication protocol for internet of things. J Supercomput 75:8231–8261
Abd El-Latif AA, Abd-El-Atty B, Mazurczyk W, Fung C, Venegas-Andraca SE (2020) Secure data encryption based on quantum walks for 5g internet of things scenario. IEEE Trans Netw Serv Manage 17(1):118–131
Chen L, Chen Q, Zhao M, Chen J, Liu S, Zhao Y (2022) Ddka-qkdn: dynamic on-demand key allocation scheme for quantum internet of things secured by qkd network. Entropy 24(2):149
Althobaiti OS, Dohler M (2021) Quantum-resistant cryptography for the internet of things based on location-based lattices. IEEE Access 9:133185–133203
Shamshad S, Riaz F, Riaz R, Rizvi SS, Abdulla S (2022) An enhanced architecture to resolve public-key cryptographic issues in the internet of things (iot), employing quantum computing supremacy. Sensors 22(21):8151
Xu D, Liu L, Zhang N, Dong M, Leung VC, Ritcey JA Nested hash access with post quantum encryption for mission-critical iot communications, IEEE Internet of Things J
Xi P, Zhang X, Wang L, Liu W, Peng S (2022) A review of blockchain-based secure sharing of healthcare data. Appl Sci 12(15):7912
Zheng Z, Xie S, Dai H-N, Chen W, Chen X, Weng J, Imran M (2020) An overview on smart contracts: challenges, advances and platforms. Futur Gener Comput Syst 105:475–491
Peng L, Feng W, Yan Z, Li Y, Zhou X, Shimizu S (2021) Privacy preservation in permissionless blockchain: a survey. Digital Commun and Netw 7(3):295–307
Dib O, Brousmiche K-L, Durand A, Thea E, Hamida EB (2018) Consortium blockchains: overview, applications and challenges. Int J Adv Telecommun 11(1):51–64
Mamun Q (2022) Blockchain technology in the future of healthcare. Smart Health 23:100223
Pabitha P, Priya JC, Praveen R, Jagatheswari S (2023) Modchain: a hybridized secure and scaling blockchain framework for iot environment. Int J Inf Technol 15(3):1741–1754
Helliar CV, Crawford L, Rocca L, Teodori C, Veneziani M (2020) Permissionless and permissioned blockchain diffusion. Int J Inf Manage 54:102136
Kushwaha SS, Joshi S, Singh D, Kaur M, Lee H-N (2022) Ethereum smart contract analysis tools: a systematic review. IEEE Access 10:57037–57062
Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (iot) security. IEEE Commun Surv & Tutorials 22(3):1646–1685
Farooq U, Tariq N, Asim M, Baker T, Al-Shamma’a A (2022) Machine learning and the internet of things security: solutions and open challenges. J Parallel and Distributed Comput 162:89–104
Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in iot security: current solutions and future challenges. IEEE Commun Surveys & Tutorials 22(3):1686–1721
Alzubaidi L, Zhang J, Humaidi AJ, Al-Dujaili A, Duan Y, Al-Shamma O, Santamaría J, Fadhel MA, Al-Amidie M, Farhan L (2021) Review of deep learning: concepts, cnn architectures, challenges, applications, future directions. J big Data 8:1–74
Thakkar A, Lohiya R (2021) A review on machine learning and deep learning perspectives of ids for iot: recent updates, security issues, and challenges. Archives of Comput Methods in Eng 28:3211–3243
Goldblum M, Tsipras D, Xie C, Chen X, Schwarzschild A, Song D, dry A, Li B, Goldstein T (2022) Dataset security for machine learning: data poisoning, backdoor attacks, and defenses. IEEE Trans Pattern Anal Mach Intell 45(2):1563–1580
Ahmad R, Alsmadi I (2021) Machine learning approaches to iot security: a systematic literature review. Internet of Things 14:100365
Ammar M, Washha M, Ramabhadran GS, Crispo B (2018) slimiot: Scalable lightweight attestation protocol for the internet of things, In: 2018 IEEE Conference on Dependable and Secure Computing (DSC), IEEE, pp 1–8
Fang D, Qian Y, Hu RQ (2020) A flexible and efficient authentication and secure data transmission scheme for iot applications. IEEE Internet Things J 7(4):3474–3484
Dhanda SS, Singh B, Jindal P (2020) Lightweight cryptography: a solution to secure iot. Wireless Pers Commun 112:1947–1980
Lo’Ai AT, Somani TF (2016) More secure internet of things using robust encryption algorithms against side channel attacks, In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). IEEE, pp 1–6
Kumar A, Garhwal S (2021) State-of-the-art survey of quantum cryptography. Arch Comput Methods in Eng 28:3831–3868
Chowdhury S, Covic A, Acharya RY, Dupee S, Ganji F, Forte D (2021) Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions, J of Cryptogr Eng, 1–37
Wang H-W, Tsai C-W, Lin J, Yang C-W (2022) Authenticated semi-quantum key distribution protocol based on w states. Sensors 22(13):4998
Kumar A, Ottaviani C, Gill SS, Buyya R (2022) Securing the future internet of things with post-quantum cryptography. Secur and Privacy 5(2):e200
Bassi R, Zhang R, Gatto A, Tornatore M, Verticale G (2023) Quantum key distribution with trusted relay using an etsi-compliant software-defined controller, In: 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), IEEE, pp 1–7
Zeydan E, Turk Y, Aksoy B, Ozturk SB (2022) Recent advances in post-quantum cryptography for networks: A survey, In: 2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ). IEEE, pp 1–8