|
|
|
Paniti Netinant, Thitipong Utsanok, Meennapa Rukhiran and Suttipong Klongdee
With the rapid rise of digitalization in the global economy, home security systems have become increasingly important for personal comfort and property protection. The collaboration between humans, the Internet of Things (IoT), and smart homes can be hig...
ver más
|
|
|
|
|
|
|
Francisco Alonso, Benjamín Samaniego, Gonzalo Farias and Sebastián Dormido-Canto
This article provides a general overview of the communication protocols used in the IEC61850 standard for the automation of electrical substations. Specifically, it examines the GOOSE and R-GOOSE protocols, which are used for exchanging various types of ...
ver más
|
|
|
|
|
|
|
Tao Feng, Taining Chen and Xiang Gong
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analy...
ver más
|
|
|
|
|
|
|
Moutaz Alazab and Salah Alhyari
Industry 4.0 has revolutionized manufacturing processes and facilities through the creation of smart and sustainable production facilities. Blockchain technology (BCT) has emerged as an invaluable asset within Industrial Revolution 4.0 (IR4.0), offering ...
ver más
|
|
|
|
|
|
|
Georgios M. Nikolopoulos and Marc Fischlin
Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used...
ver más
|
|
|
|
|
|
|
Spyridon Daousis, Nikolaos Peladarinos, Vasileios Cheimaras, Panagiotis Papageorgas, Dimitrios D. Piromalis and Radu Adrian Munteanu
This paper highlights the crucial role of wireless sensor networks (WSNs) in the surveillance and administration of critical infrastructures (CIs), contributing to their reliability, security, and operational efficiency. It starts by detailing the intern...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Ayman Khalil and Besma Zeddini
The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users and or...
ver más
|
|
|
|
|
|
|
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr...
ver más
|
|
|
|
|
|
|
Christian Esposito, Ross Horne, Livio Robaldo, Bart Buelens and Elfi Goesaert
The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, se...
ver más
|
|
|
|