Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions

[1]  Muhammad Khurram Khan,et al.  Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges , 2019, J. Netw. Comput. Appl..

[2]  Kim-Kwang Raymond Choo,et al.  Blockchain in healthcare applications: Research challenges and opportunities , 2019, J. Netw. Comput. Appl..

[3]  Sava Savic,et al.  First purpose built protocol for supply chains based on blockchain , 2022 .

[4]  Manfred Tscheligi,et al.  uTRUSTit - Usable Trust in the Internet of Things , 2012, TrustBus.

[5]  Jaroslaw Krygier,et al.  A trust-based situation awareness system for military applications of the internet of things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[6]  Ananthram Swami,et al.  CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks , 2018, IEEE Transactions on Services Computing.

[7]  Yasir Hussain,et al.  Context-Aware Trust and Reputation Model for Fog-Based IoT , 2020, IEEE Access.

[8]  Xinyu Yang,et al.  A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.

[9]  Salil S. Kanhere,et al.  BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.

[10]  Charu Virmani,et al.  Convergence of Blockchain and IoT: An Edge Over Technologies , 2019, Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications.

[11]  Muhammad Alam,et al.  A payload-based mutual authentication scheme for Internet of Things , 2017, Future Gener. Comput. Syst..

[12]  Dongxi Liu,et al.  Lightweight Mutual Authentication for IoT and Its Applications , 2017, IEEE Transactions on Sustainable Computing.

[13]  Ruhul Amin,et al.  Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment , 2018, Future Gener. Comput. Syst..

[14]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[15]  Hai Dong,et al.  Machine Learning-Driven Trust Prediction for MEC-Based IoT Services , 2019, 2019 IEEE International Conference on Web Services (ICWS).

[16]  Manuel Díaz,et al.  State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing , 2016, J. Netw. Comput. Appl..

[17]  Dimitrios Tzovaras,et al.  Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project , 2018, Euro-CYBERSEC.

[18]  Palaiahnakote Shivakumara,et al.  Channel-wise attention model-based fire and rating level detection in video , 2019, CAAI Trans. Intell. Technol..

[19]  Geyong Min,et al.  Lifelogging Data Validation Model for Internet of Things Enabled Personalized Healthcare , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[20]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[21]  Muhammad Khurram Khan,et al.  Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare , 2018, IEEE Access.

[22]  Merrihan B. Monir,et al.  Trust management in cloud computing: A survey , 2015, 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS).

[23]  Sarah Asiri,et al.  An IoT trust and reputation model based on recommender systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[24]  Hodjat Hamidi,et al.  An approach to develop the smart health using Internet of Things and authentication based on biometric technology , 2019, Future Gener. Comput. Syst..

[25]  Bo Hu,et al.  A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.

[26]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[27]  Hai Jin,et al.  Fully Reversible Privacy Region Protection for Cloud Video Surveillance , 2017, IEEE Transactions on Cloud Computing.

[28]  Roberto Di Pietro,et al.  CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT , 2017, 2017 IEEE International Conference on Communications (ICC).

[29]  Mohammad Shojafar,et al.  LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT , 2019, Future Gener. Comput. Syst..

[30]  Georgios Kambourakis,et al.  The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[31]  Hassan N. Noura,et al.  Secure and Lightweight Mutual Multi-Factor Authentication for IoT Communication Systems , 2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall).

[32]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[33]  Nenghai Yu,et al.  Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data , 2019, IEEE Internet of Things Journal.

[34]  Shouhuai Xu,et al.  A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses , 2019 .

[35]  David E. Culler,et al.  Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.

[36]  Tadeusz Czachórski,et al.  European Cybersecurity Research and the SerIoT Project , 2018, ISCIS.

[37]  Joy Iong-Zong Chen,et al.  Embedding the MRC and SC Schemes into Trust Management Algorithm Applied to IoT Security Protection , 2018, Wirel. Pers. Commun..

[38]  Tommi Mikkonen,et al.  A Roadmap to the Programmable World: Software Challenges in the IoT Era , 2017, IEEE Software.

[39]  Gema Fernández Bascuñana,et al.  Validation of Authentication Measures Implementation in Iot Mobile Applications , 2019, Smart Cities.

[40]  Jiangbin Zheng,et al.  Mobile crowdsensing: A survey on privacy-preservation, task management, assignment models, and incentives mechanisms , 2019, Future Gener. Comput. Syst..

[41]  Wei Ni,et al.  Survey on blockchain for Internet of Things , 2019, Comput. Commun..

[42]  Md Sadek Ferdousa,et al.  Integrated platforms for blockchain enablement , 2022 .

[43]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[44]  Mohamed Amine Ferrag,et al.  Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.

[45]  Moritz Petersen,et al.  Blockchain in logistics and supply chain : trick or treat? , 2017 .

[46]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[47]  Panagiotis Papadimitratos,et al.  SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things , 2017, Future Gener. Comput. Syst..

[48]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[49]  Wei Ni,et al.  Blockchain's adoption in IoT: The challenges, and a way forward , 2019, J. Netw. Comput. Appl..

[50]  Namje Park,et al.  CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia , 2019 .

[51]  Xiangjian He,et al.  P2DCA: A Privacy-Preserving-Based Data Collection and Analysis Framework for IoMT Applications , 2019, IEEE Journal on Selected Areas in Communications.

[52]  Juan Carlos De Martin,et al.  Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[53]  Fengling Han,et al.  A Blockchain Implementation for the Cataloguing of CCTV Video Evidence , 2018, 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[54]  Abderrahmen Mtibaa,et al.  Towards Service Discovery and Invocation in Data-Centric Edge Networks , 2019, 2019 IEEE 27th International Conference on Network Protocols (ICNP).

[55]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[56]  Adriaan Larmuseau,et al.  Private Blockchain Configurations for Improved IoT Security , 2019, Blockchain for Distributed Systems Security.

[57]  Hyeon-Eui Kim,et al.  Blockchain distributed ledger technologies for biomedical and health care applications , 2017, J. Am. Medical Informatics Assoc..

[58]  Paul Barford,et al.  A Residential Client-side Perspective on SSL Certificates , 2019, 2019 Network Traffic Measurement and Analysis Conference (TMA).

[59]  Wenjia Li,et al.  Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities , 2018, IEEE Internet of Things Journal.

[60]  Mohammed Atiquzzaman,et al.  Interoperability in Internet of Things: Taxonomies and Open Challenges , 2018, Mobile Networks and Applications.

[61]  Xu Yong,et al.  Three-stage network for age estimation , 2019 .

[62]  Fernand Meyer,et al.  A comparative study of LPWAN technologies for large-scale IoT deployment , 2019, ICT Express.

[63]  Khaled Salah,et al.  IoT Public Fog Nodes Reputation System: A Decentralized Solution Using Ethereum Blockchain , 2019, IEEE Access.

[64]  Guoyin Wang,et al.  Survey on cloud model based similarity measure of uncertain concepts , 2019, CAAI Trans. Intell. Technol..

[65]  Xinxin Fan Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems , 2018, ICBC.

[66]  Nikos Fotiou,et al.  Decentralized authorization in constrained IoT environments exploiting interledger mechanisms , 2020, Comput. Commun..

[67]  Vivek Kulkarni,et al.  SEMIoTICS Architectural Framework: End-to-end Security, Connectivity and Interoperability for Industrial IoT , 2019, 2019 Global IoT Summit (GIoTS).

[68]  Yi Han,et al.  A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos , 2019, Sensors.

[69]  Mahmoud Al-Ayyoub,et al.  SDIoT: a software defined based internet of things framework , 2015, Journal of Ambient Intelligence and Humanized Computing.

[70]  Mohammad Shikh-Bahaei,et al.  Survey on peer-assisted content delivery networks , 2017, Comput. Networks.

[71]  Symeon Papavassiliou,et al.  Design and Assessment of a Reputation-Based Trust Framework in Wireless Testbeds Utilizing User Experience , 2013, ADHOC-NOW.

[72]  Yubin Xia,et al.  ShadowEth: Private Smart Contract on Public Blockchain , 2018, Journal of Computer Science and Technology.

[73]  Ali Ghaffari,et al.  Software defined networks: A survey , 2016, J. Netw. Comput. Appl..

[74]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[75]  Gautam Srivastava,et al.  A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.

[76]  Yang Lu,et al.  Industry 4.0: A survey on technologies, applications and open research issues , 2017, J. Ind. Inf. Integr..

[77]  Alexander Bahr,et al.  Vertex: A New Distributed Underwater Robotic Platform for Environmental Monitoring , 2016, DARS.

[78]  Nikos Fotiou,et al.  Improving the Privacy of IoT with Decentralised Identifiers (DIDs) , 2019, J. Comput. Networks Commun..

[79]  Nicola Capece,et al.  A Low-Cost Full Body Tracking System in Virtual Reality Based on Microsoft Kinect , 2018, AVR.

[80]  Bela Gipp,et al.  OriginStamp: A blockchain-backed system for decentralized trusted timestamping , 2018, it - Information Technology.

[81]  Xiangjian He,et al.  A Survey on Big Multimedia Data Processing and Management in Smart Cities , 2019, ACM Comput. Surv..

[82]  Ali Chehab,et al.  One round cipher algorithm for multimedia IoT devices , 2018, Multimedia Tools and Applications.

[83]  Youakim Badr,et al.  Internet of Medical Things: A Review of Recent Contributions Dealing With Cyber-Physical Systems in Medicine , 2018, IEEE Internet of Things Journal.

[84]  Mahadev Satyanarayanan,et al.  Enabling Live Video Analytics with a Scalable and Privacy-Aware Framework , 2018, ACM Trans. Multim. Comput. Commun. Appl..

[85]  Karol Furdik,et al.  The EBBITS Project: An Interoperability platform for a Real-world populated Internet of Things domain , 2011 .

[86]  Bingsheng He,et al.  QoS-Aware Resource Allocation for Video Transcoding in Clouds , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[87]  Victor I. Chang,et al.  Privacy-preserving fusion of IoT and big data for e-health , 2018, Future Gener. Comput. Syst..

[88]  Victor C. M. Leung,et al.  Distributed Resource Allocation in Blockchain-Based Video Streaming Systems With Mobile Edge Computing , 2019, IEEE Transactions on Wireless Communications.

[89]  Luigi Alfredo Grieco,et al.  Robotic-aided IoT: automated deployment of a 6TiSCH network using an UGV , 2019, IET Wirel. Sens. Syst..

[90]  Alexander Afanasyev,et al.  nTorrent: Peer-to-Peer File Sharing in Named Data Networking , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[91]  Shahid Mumtaz,et al.  Smart Cameras Are Making Our Beaches Safer: A 5G-Envisioned Distributed Architecture for Safe, Connected Coastal Areas , 2017, IEEE Vehicular Technology Magazine.

[92]  Byung-Seo Kim,et al.  Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.

[93]  Satyajayant Misra,et al.  ICedge: When Edge Computing Meets Information-Centric Networking , 2020, IEEE Internet of Things Journal.

[94]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[95]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[96]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[97]  Zhiyuan Tan,et al.  SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application , 2019, J. Netw. Comput. Appl..

[98]  Syed Hassan Ahmed,et al.  IoMT: A Reliable Cross Layer Protocol for Internet of Multimedia Things , 2017, IEEE Internet of Things Journal.

[99]  Byung-Seo Kim,et al.  ICN with edge for 5G: Exploiting in-network caching in ICN-based edge computing for 5G networks , 2020, Future Gener. Comput. Syst..

[100]  Xiangjian He,et al.  A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[101]  Ahmed Serhrouchni,et al.  Bubbles of Trust: A decentralized blockchain-based authentication system for IoT , 2018, Comput. Secur..

[102]  Oumaima Ben Abderrahim,et al.  TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[103]  Nashwan Adnan Othman,et al.  A new IoT combined body detection of people by using computer vision for security application , 2017, 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN).

[104]  Sotiris Ioannidis,et al.  Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments , 2019, 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[105]  Aleksandr Ometov,et al.  Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications , 2019, IEEE Network.

[106]  F. Richard Yu,et al.  A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.

[107]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[108]  Carsten Bormann,et al.  CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.

[109]  Daniel Minoli,et al.  Blockchain mechanisms for IoT security , 2018, Internet Things.

[110]  Andrei V. Gurtov,et al.  Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[111]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[112]  Marcos A. Simplício,et al.  Lightweight and escrow-less authenticated key agreement for the internet of things , 2017, Comput. Commun..

[113]  Tiago M. Fernández-Caramés,et al.  A Review on Blockchain Technologies for an Advanced and Cyber-Resilient Automotive Industry , 2019, IEEE Access.

[114]  Ahmed Banafa,et al.  IoT and Blockchain Convergence: Benefits and Challenges , 2017 .

[115]  Samaher Al-Janabi,et al.  Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .

[116]  Mianxiong Dong,et al.  Real-Time Awareness Scheduling for Multimedia Big Data Oriented In-Memory Computing , 2018, IEEE Internet of Things Journal.

[117]  Manuel Díaz,et al.  On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[118]  RomanRodrigo,et al.  Securing the Internet of Things , 2011 .

[119]  Daniel A. Rodríguez-Silva,et al.  Video Surveillance Based on Cloud Storage , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[120]  Jian Shen,et al.  An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment , 2017, J. Netw. Comput. Appl..

[121]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.

[122]  Andreas Mitschele-Thiel,et al.  Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture , 2017, IEEE Communications Magazine.

[123]  Mingyang Li,et al.  LE-HGR: A Lightweight and Efficient RGB-Based Online Gesture Recognition Network for Embedded AR Devices , 2019, 2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct).

[124]  Weisong Shi,et al.  On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..

[125]  Nima Jafari Navimipour,et al.  A Comprehensive Study on the Trust Management Techniques in the Internet of Things , 2019, IEEE Internet of Things Journal.

[126]  Saso Koceski,et al.  Evaluation of an Assistive Telepresence Robot for Elderly Healthcare , 2016, Journal of Medical Systems.

[127]  Hamid Al-Hamadi,et al.  Trust-Based Decision Making for Health IoT Systems , 2017, IEEE Internet of Things Journal.

[128]  Juan Li,et al.  A Decentralized Trustworthy Context and QoS-Aware Service Discovery Framework for the Internet of Things , 2017, IEEE Access.

[129]  Xiangjian He,et al.  Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..

[130]  Praveen Gauravaram,et al.  LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy , 2017, ArXiv.

[131]  Touradj Ebrahimi,et al.  A framework for the validation of privacy protection solutions in video surveillance , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[132]  Abderrahmen Mtibaa,et al.  A Case for Compute Reuse in Future Edge Systems: An Empirical Study , 2019, 2019 IEEE Globecom Workshops (GC Wkshps).

[133]  Ludwig Seitz,et al.  S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things , 2016, IEEE Transactions on Automation Science and Engineering.

[134]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[135]  Spyridon Mastorakis,et al.  Next-Generation Networking and Edge Computing for Mixed Reality Real-Time Interactive Systems , 2020, 2020 IEEE International Conference on Communications Workshops (ICC Workshops).

[136]  Tiago M. Fernández-Caramés,et al.  A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.

[137]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[138]  Fadi Al-Turjman,et al.  Data Delivery in Wireless Multimedia Sensor Networks: Challenging and Defying in the IoT Era , 2017, IEEE Wireless Communications.

[139]  Jong Hyuk Park,et al.  Blockchain based hybrid network architecture for the smart city , 2018, Future Gener. Comput. Syst..

[140]  Yida Wang,et al.  iRobot: an intelligent crawler for web forums , 2008, WWW.

[141]  Waqar Mahmood,et al.  Internet of multimedia things: Vision and challenges , 2015, Ad Hoc Networks.

[142]  Xianzhi Wang,et al.  Trust architecture and reputation evaluation for internet of things , 2018, J. Ambient Intell. Humaniz. Comput..

[143]  Mahadev Satyanarayanan,et al.  A Scalable and Privacy-Aware IoT Service for Live Video Analytics , 2017, MMSys.

[144]  Zibin Zheng,et al.  Blockchain for Internet of Things: A Survey , 2019, IEEE Internet of Things Journal.

[145]  Ramiro Liscano,et al.  Distributed Policy-Based Management for Wireless Sensor Networks , 2012, ANT/MobiWIS.

[146]  Atul Prakash,et al.  Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? , 2017, IEEE Security & Privacy.

[147]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[148]  Jason P. Jue,et al.  All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .

[149]  Cong Zhang,et al.  Fog-Based Transcoding for Crowdsourced Video Livecast , 2017, IEEE Communications Magazine.

[150]  Tian Feng,et al.  The multimedia blockchain: A distributed and tamper-proof media transaction framework , 2017, 2017 22nd International Conference on Digital Signal Processing (DSP).

[151]  Soma Bandyopadhyay,et al.  IoT-Privacy: To be private or not to be private , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[152]  Jong Hyuk Park,et al.  BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence , 2020, Future Gener. Comput. Syst..

[153]  Xiangjian He,et al.  SAMS: A Seamless and Authorized Multimedia Streaming Framework for WMSN-Based IoMT , 2019, IEEE Internet of Things Journal.

[154]  Xiangjian He,et al.  A Distributed and Anonymous Data Collection Framework Based on Multilevel Edge Computing Architecture , 2020, IEEE Transactions on Industrial Informatics.

[155]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[156]  Haider Abbas,et al.  Trust models of internet of smart things: A survey, open issues, and future directions , 2019, J. Netw. Comput. Appl..

[157]  Shahid Raza,et al.  TinyIKE: Lightweight IKEv2 for Internet of Things , 2019, IEEE Internet of Things Journal.

[158]  Xing Liu,et al.  Distributed Ledger Technology , 2024, Communications in Computer and Information Science.

[159]  Jing He,et al.  Privacy preserving classification on local differential privacy in data centers , 2020, J. Parallel Distributed Comput..

[160]  Gyu Myoung Lee,et al.  Data centric trust evaluation and prediction framework for IOT , 2017, 2017 ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K).

[161]  Gang Chen,et al.  Untangling Blockchain: A Data Processing View of Blockchain Systems , 2017, IEEE Transactions on Knowledge and Data Engineering.

[162]  Khaled Salah,et al.  Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.

[163]  Ralph Deters,et al.  Zero-Trust Hierarchical Management in IoT , 2018, 2018 IEEE International Congress on Internet of Things (ICIOT).