Skip Content
You are currently on the new version of our website. Access the old version .

39 Results Found

  • Article
  • Open Access
1 Citations
1,510 Views
17 Pages

Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security

  • Guobin Xu,
  • Oluwole Adetifa,
  • Jianzhou Mao,
  • Eric Sakk and
  • Shuangbao Wang

26 April 2025

Randomness is integral to computer security, influencing fields such as cryptography and machine learning. In the context of cybersecurity, particularly for the Internet of Things (IoT), high levels of randomness are essential to secure cryptographic...

  • Article
  • Open Access
1 Citations
4,760 Views
17 Pages

The implementation of Central Bank Digital Currencies (CBDCs) faces significant challenges in achieving the same level of anonymity and convenience in offline transactions as cash. This limitation imposes considerable constraints on the development a...

  • Article
  • Open Access
10 Citations
3,409 Views
19 Pages

6 September 2023

This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids. Data and device security plays a pivotal role in smart grids since they are vulnerable to...

  • Article
  • Open Access
10 Citations
3,034 Views
24 Pages

Blockchain-Based Services Implemented in a Microservices Architecture Using a Trusted Platform Module Applied to Electric Vehicle Charging Stations

  • Antonio J. Cabrera-Gutiérrez,
  • Encarnación Castillo,
  • Antonio Escobar-Molero,
  • Juan Cruz-Cozar,
  • Diego P. Morales and
  • Luis Parrilla

24 May 2023

Microservice architectures exploit container-based virtualized services, which rarely use hardware-based cryptography. A trusted platform module (TPM) offers a hardware root for trust in services that makes use of cryptographic operations. The virtua...

  • Article
  • Open Access
1,621 Views
32 Pages

20 May 2025

Virtual Trusted Platform Modules (vTPMs) are widely adopted in commercial cloud platforms such as VMware Cloud, Google Cloud, Microsoft Azure, and Amazon AWS. However, as software-based components, vTPMs do not provide the same security guarantees as...

  • Article
  • Open Access
1,333 Views
25 Pages

19 June 2025

Embedded system networks are widely deployed across various domains and often perform mission-critical tasks, making it essential for all nodes within the system to be trustworthy. Traditionally, each node is equipped with a discrete Trusted Platform...

  • Article
  • Open Access
11 Citations
3,874 Views
30 Pages

A Framework for Constructing a Secure Domain of Sensor Nodes

  • Janusz Furtak,
  • Zbigniew Zieliński and
  • Jan Chudzikiewicz

21 June 2019

Application of the Internet of Things (IoT) in some critical areas (e.g., military) is limited mainly due to the lack of robust, secure, and trusted measures needed to ensure the availability, confidentiality, and integrity of information throughout...

  • Feature Paper
  • Article
  • Open Access
3 Citations
2,908 Views
26 Pages

An Automotive Reference Testbed with Trusted Security Services

  • Teri Lenard,
  • Béla Genge,
  • Piroska Haller,
  • Anastasija Collen and
  • Niels Alexander Nijdam

While research in the field of automotive systems inclined in the past years towards technologies such as Vehicle-to-Everything (V2X) or Connected and Automated Vehicle (CAV), the underlying system security still plays a crucial role in assuring trus...

  • Article
  • Open Access
9 Citations
4,459 Views
30 Pages

3 September 2020

Designers and users of the Internet of Things (IoT) are devoting more and more attention to the issues of security and privacy as well as the integration of data coming from various areas. A critical element of cooperation is building mutual trust an...

  • Article
  • Open Access
2 Citations
3,614 Views
28 Pages

ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System

  • Annapureddy Venkata Sai Kumar Reddy and
  • Gourinath Banda

16 December 2024

The widespread reliance on paper-based currency poses significant drawbacks, such as counterfeiting, lack of transparency, and environmental impacts. While Central Bank Digital Currencies (CBDCs) address many of these issues, their dependence on cont...

  • Article
  • Open Access
8 Citations
3,595 Views
20 Pages

RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation

  • Ernesto Gómez-Marín,
  • Luis Parrilla,
  • Gianfranco Mauro,
  • Antonio Escobar-Molero,
  • Diego P. Morales and
  • Encarnación Castillo

5 July 2022

This paper presents and implements a novel remote attestation method to ensure the integrity of a device applicable to decentralized infrastructures, such as those found in common edge computing scenarios. Edge computing can be considered as a framew...

  • Article
  • Open Access
12 Citations
3,081 Views
17 Pages

30 May 2022

With the establishment of intelligent transportation systems (ITS), research on vehicle ad-hoc networks (VANETs) has played an irreplaceable role in improving traffic safety and efficiency. However, because the deployment of devices based on the IoV...

  • Article
  • Open Access
2 Citations
3,335 Views
20 Pages

14 April 2023

Lattice attacks can compromise the security of encryption algorithms used in blockchain networks, allowing attackers to tamper with transaction records, steal private keys, and execute other forms of attacks. With symmetric encryption, both parties c...

  • Article
  • Open Access
23 Citations
5,956 Views
18 Pages

27 September 2019

The increased number of cyber threats against the Supervisory Control and Data Acquisition (SCADA) and automation systems in the Industrial-Internet-of-Things (IIoT) and Industry 4.0 era has raised concerns in respect to the importance of securing cr...

  • Article
  • Open Access
1 Citations
1,386 Views
18 Pages

22 June 2025

IoT devices typically have limited memory resources and computing power. For this reason, it is often not possible to use the authentication and trusted environment mechanisms commonly used on the Internet. Due to the autonomous operation of IoT devi...

  • Article
  • Open Access
5 Citations
3,326 Views
36 Pages

26 May 2023

The Internet of Things (IoT) is a very abundant source of data, as well as a source of many vulnerabilities. A significant challenge is preparing security solutions to protect IoT nodes’ resources and the data exchanged. The difficulty usually...

  • Article
  • Open Access
1 Citations
2,020 Views
28 Pages

EMBRAVE: EMBedded Remote Attestation and Verification framEwork

  • Enrico Bravi,
  • Alessio Claudio,
  • Antonio Lioy and
  • Andrea Vesco

4 September 2025

The Internet of Things (IoT) is a growing area of interest with an increasing number of applications, including cyber–physical systems (CPS). Emerging threats in the IoT context make software integrity verification a key solution for checking t...

  • Article
  • Open Access
9 Citations
7,272 Views
15 Pages

Secure Boot for Reconfigurable Architectures

  • Ali Shuja Siddiqui,
  • Yutian Gui and
  • Fareena Saqib

Reconfigurable computing is becoming ubiquitous in the form of consumer-based Internet of Things (IoT) devices. Reconfigurable computing architectures have found their place in safety-critical infrastructures such as the automotive industry. As the t...

  • Article
  • Open Access
475 Views
29 Pages

Modern cryptographic systems increasingly depend on certified hardware modules to guarantee trustworthy key management, tamper resistance, and secure execution across Internet of Things (IoT), embedded, and cloud infrastructures. Although numerous FI...

  • Article
  • Open Access
1,643 Views
27 Pages

21 October 2025

Small and medium-sized enterprises (SMEs) drive economic growth but face barriers in adopting AI for creative digital marketing, particularly in underserved U.S. markets. This study investigates an AI-driven unified advisory platform to enable strate...

  • Article
  • Open Access
1 Citations
1,683 Views
19 Pages

As blockchain technology advances, cross-chain interoperability has become a crucial requirement for achieving seamless interaction among multiple chains. To solve this problem, this paper proposes a scholarly approach to the development of a cross-c...

  • Article
  • Open Access
31 Citations
6,431 Views
16 Pages

A Blockchain-Based Trusted Edge Platform in Edge Computing Environment

  • Jinnan Zhang,
  • Changqi Lu,
  • Gang Cheng,
  • Teng Guo,
  • Jian Kang,
  • Xia Zhang,
  • Xueguang Yuan and
  • Xin Yan

18 March 2021

Edge computing is a product of the evolution of IoT and the development of cloud computing technology, providing computing, storage, network, and other infrastructure close to users. Compared with the centralized deployment model of traditional cloud...

  • Article
  • Open Access
9 Citations
3,647 Views
24 Pages

SealedGRID: Secure and Interoperable Platform for Smart GRID Applications

  • George Suciu,
  • Mari-Anais Sachian,
  • Alexandru Vulpe,
  • Marius Vochin,
  • Aristeidis Farao,
  • Nikolaos Koutroumpouchos and
  • Christos Xenakis

12 August 2021

Recent advancements in information and communication technologies (ICT) have improved the power grid, leading to what is known as the smart grid, which, as part of a critical economic and social infrastructure, is vulnerable to security threats from...

  • Article
  • Open Access
2 Citations
2,607 Views
26 Pages

Trustworthy Environmental Monitoring Using Hardware-Assisted Security Mechanisms

  • Laurent Segers,
  • Borna Talebi,
  • Bruno da Silva,
  • Abdellah Touhafi and
  • An Braeken

20 July 2024

Environmental monitoring is essential for safeguarding the health of our planet and protecting human health and well-being. Without trust, the effectiveness of environmental monitoring and the ability to address environmental challenges are significa...

  • Review
  • Open Access
1 Citations
3,510 Views
45 Pages

Building Trust in Autonomous Aerial Systems: A Review of Hardware-Rooted Trust Mechanisms

  • Sagir Muhammad Ahmad,
  • Mohammad Samie and
  • Barmak Honarvar Shakibaei Asli

10 October 2025

Unmanned aerial vehicles (UAVs) are redefining both civilian and defense operations, with swarm-based architectures unlocking unprecedented scalability and autonomy. However, these advancements introduce critical security challenges, particularly in...

  • Article
  • Open Access
4 Citations
3,978 Views
27 Pages

Security First, Safety Next: The Next-Generation Embedded Sensors for Autonomous Vehicles

  • Luís Cunha,
  • João Sousa,
  • José Azevedo,
  • Sandro Pinto and
  • Tiago Gomes

The automotive industry is fully shifting towards autonomous connected vehicles. By advancing vehicles’ intelligence and connectivity, the industry has enabled innovative functions such as advanced driver assistance systems (ADAS) in the direct...

  • Article
  • Open Access
8 Citations
4,038 Views
23 Pages

Design and Implementation of Virtual Security Function Based on Multiple Enclaves

  • Juan Wang,
  • Yang Yu,
  • Yi Li,
  • Chengyang Fan and
  • Shirong Hao

6 January 2021

Network function virtualization (NFV) provides flexible and scalable network function for the emerging platform, such as the cloud computing, edge computing, and IoT platforms, while it faces more security challenges, such as tampering with network p...

  • Article
  • Open Access
8 Citations
3,290 Views
16 Pages

A New Secure and Anonymous Metering Scheme for Smart Grid Communications

  • Shaohao Xie,
  • Fangguo Zhang,
  • Huizhi Lin and
  • Yangtong Tian

12 December 2019

The smart meter is one of the most important components of the smart grid, which enables bi-directional communication between electric power providers and in-home appliances. However, the fine-grained metering mechanism that reports real-time electri...

  • Article
  • Open Access
12 Citations
5,171 Views
24 Pages

30 August 2023

The trustworthiness of a system is not just about proving the identity or integrity of the hardware but also extends to the data, control, and management planes of communication between devices and the software they are running. This trust in data an...

  • Article
  • Open Access
11 Citations
2,816 Views
19 Pages

20 September 2024

The grain supply chain is crucial for any nation’s self-sustainability due to its huge impact on food security, economic stability, and the livelihoods of several people. The path grain takes from farmers to consumers is opaque and complicated,...

  • Article
  • Open Access
129 Views
18 Pages

Real Time IoT Low-Cost Air Quality Monitoring System

  • Silvian-Marian Petrică,
  • Ioana Făgărășan,
  • Nicoleta Arghira and
  • Iulian Munteanu

21 January 2026

This paper proposes a complete solution, implementing a low-cost, energy-independent, network-connected, and scalable environmental air parameter monitoring system. It features a remote sensing module which provides environmental data to a cloud-base...

  • Proceeding Paper
  • Open Access

7 November 2025

The fast expansion of the Internet of Things (IoT) has accelerated the advancement of smart home technologies. However, secure communication and access control remain significant challenges. This paper presents a fully implemented FPGA-based IoT gate...

  • Article
  • Open Access
20 Citations
5,784 Views
17 Pages

3 January 2019

Information security is the foundation for building trust between the Internet of Things (IoT) and its users. Due to the sharp increase of information quantity and the limitation of hardware resources, it is difficult to maintain the high performance...

  • Article
  • Open Access
1 Citations
4,040 Views
18 Pages

A Hardware Platform for Ensuring OS Kernel Integrity on RISC-V

  • Donghyun Kwon,
  • Dongil Hwang and
  • Yunheung Paek

26 August 2021

The OS kernel is typically preassumed as a trusted computing base in most computing systems. However, it also implies that once an attacker takes control of the OS kernel, the attacker can seize the entire system. Because of such security importance...

  • Article
  • Open Access
7 Citations
2,868 Views
17 Pages

Interpretable Deep Learning for Discriminating Pneumonia from Lung Ultrasounds

  • Mohamed Abdel-Basset,
  • Hossam Hawash,
  • Khalid Abdulaziz Alnowibet,
  • Ali Wagdy Mohamed and
  • Karam M. Sallam

6 November 2022

Lung ultrasound images have shown great promise to be an operative point-of-care test for the diagnosis of COVID-19 because of the ease of procedure with negligible individual protection equipment, together with relaxed disinfection. Deep learning (D...

  • Review
  • Open Access
53 Citations
10,050 Views
26 Pages

8 February 2022

During the last few years, a wide variety of Internet of Drones (IoD) applications have emerged with numerous heterogeneous aerial and ground network elements interconnected and equipped with advanced sensors, computation resources, and communication...

  • Article
  • Open Access
4 Citations
3,596 Views
17 Pages

(Mis)Information, Fears and Preventative Health Behaviours Related to COVID-19

  • Carmina Castellano-Tejedor,
  • María Torres-Serrano and
  • Andrés Cencerrado

Social and mass media platforms (SMM) are essential tools for keeping people informed about health-promoting practices. However, the potential to spread misinformation or false rumors exists. These might influence preventive health behaviours and inc...

  • Article
  • Open Access
4 Citations
2,727 Views
27 Pages

This paper presents an integrated Smart City platform that combines digital twin technology, advanced machine learning, and a private blockchain network to enhance data-driven decision making and operational efficiency in both public enterprises and...

  • Article
  • Open Access
67 Citations
13,232 Views
15 Pages

The Diabetes Assistant: A Smartphone-Based System for Real-Time Control of Blood Glucose

  • Patrick Keith-Hynes,
  • Benton Mize,
  • Antoine Robert and
  • Jérôme Place

14 November 2014

Type 1 Diabetes Mellitus (T1DM) is an autoimmune disease in which the insulin-producing beta cells of the pancreas are destroyed and insulin must be injected daily to enable the body to metabolize glucose. Standard therapy for T1DM involves self-mo...