Security service
View article
IoT Privacy and Security: Challenges and Solutions Open
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challe…
View article
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions Open
Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will …
View article
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications Open
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing sy…
View article
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges Open
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy iss…
View article
A Digital Twin Based Industrial Automation and Control System Security Architecture Open
The digital twin is a rather new industrial control and automation systems concept. While the approach so far has gained interest mainly due to capabilities to make advanced simulations and optimizations, recently the possibilities for enh…
View article
Security for 5G Mobile Wireless Networks Open
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive study on the security of 5G wireless network systems compared with the traditional cellular net…
View article
A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics Open
Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring and control components of critical infrastructures, such as power, telecommunication, transportation, pipelines, chemicals and manufacturing plants. Leg…
View article
The Internet of Things: a security point of view Open
Purpose – The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various ap…
View article
Smart Contract Privacy Protection Using AI in Cyber-Physical Systems: Tools, Techniques and Challenges Open
Applications of Blockchain (BC) technology and Cyber-Physical Systems (CPS) are increasing exponentially. However, framing resilient and correct smart contracts (SCs) for these smart application is a quite challenging task because of the c…
View article
Blockchain Technology: Security Issues, Healthcare Applications, Challenges and Future Trends Open
Blockchain technology provides a data structure with inherent security properties that include cryptography, decentralization, and consensus, which ensure trust in transactions. It covers widely applicable usages, such as in intelligent ma…
View article
On the impact of security vulnerabilities in the npm package dependency network Open
Security vulnerabilities are among the most pressing problems in open source software package libraries. It may take a long time to discover and fix vulnerabilities in packages. In addition, vulnerabilities may propagate to dependent packa…
View article
Chatbots: Security, privacy, data protection, and social aspects Open
Summary Chatbots are artificial communication systems becoming increasingly popular and not all their security questions are clearly solved. People use chatbots for assistance in shopping, bank communication, meal delivery, healthcare, car…
View article
Security Requirements and Challenges of 6G Technologies and Applications Open
After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enab…
View article
Security Testbed for Internet-of-Things Devices Open
The Internet of Things (IoT) is a global ecosystem of information and communication technologies aimed at connecting any type of object (thing), at any time, and in any place, to each other and to the Internet. One of the major problems as…
View article
A Review of Security Standards and Frameworks for IoT-Based Smart Environments Open
Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about …
View article
A Survey of Machine Learning-Based Solutions for Phishing Website Detection Open
With the development of the Internet, network security has aroused people’s attention. It can be said that a secure network environment is a basis for the rapid and sound development of the Internet. Phishing is an essential class of cyber…
View article
Smart Contract Security: A Software Lifecycle Perspective Open
Smart contract security is an emerging research area that deals with security issues arising from the execution of smart contracts in a blockchain system. Generally, a smart contract is a piece of executable code that automatically runs on…
View article
On Securing Underwater Acoustic Networks: A Survey Open
Underwater acoustic networks (UWANs) are often deployed in unattended and untransparent or even hostile environments and face many security threats, while many applications based on UWANs require secure communication, such as costal defens…
View article
Security of IoT Application Layer Protocols: Challenges and Findings Open
IoT technologies are becoming pervasive in public and private sectors and represent presently an integral part of our daily life. The advantages offered by these technologies are frequently coupled with serious security issues that are oft…
View article
Security and Privacy in Cloud Computing: Technical Review Open
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the s…
View article
5G Network Slicing: A Security Overview Open
The fifth-generation (5G) of cellular networks is currently under deployment by network operators, and new 5G end-user devices are about to be commercialized by many manufacturers. This is just a first step in the 5G's development, and the…
View article
How integration of cyber security management and incident response enables organizational learning Open
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors. When threats materialize, the consequences can be significant. Most large organizations invest in a dedicated information security manage…
View article
Security trends in Internet of Things: a survey Open
The Internet of Things (IoT) is a network of embedded devices that are uniquely identifiable and have embedded software required to communicate between the transient states. The purpose of this study is to explore discrete IoT security cha…
View article
Security Data Collection and Data Analytics in the Internet: A Survey Open
Attacks over the Internet are becoming more and more complex and sophisticated. How to detect security threats and measure the security of the Internet arises a significant research topic. For detecting the Internet attacks and measuring i…
View article
Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach Open
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous and distributed systems, and it has increasingly become a ubiquitous computing service platform. However, due to the lack of sufficient computing and…
View article
A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things Open
Internet of Things (IoT) facilitates the integration between objects and different sensors to provide communication among them without human intervention. However, the extensive demand for IoT and its various applications has continued to …
View article
STORE: Security Threat Oriented Requirements Engineering Methodology Open
As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessit…
View article
A Systematic Review of the State of Cyber-Security in Water Systems Open
Critical infrastructure systems are evolving from isolated bespoke systems to those that use general-purpose computing hosts, IoT sensors, edge computing, wireless networks and artificial intelligence. Although this move improves sensing a…
View article
Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms Open
The Internet of Things (IoT) is an evolving global trend in Web-based information architecture aiding in the exchange of services and goods over a network without necessitating human-to-human or human-to-computer interaction. It has the po…
View article
Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles Open
With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have increased in civil and military applications including rescue operations, disaster recovery, and military operations. Despite the utility and advantages o…