IoT: Communication protocols and security threats
Journal Article
Gerodimos, A., Maglaras, L., Ferrag, M. A., Ayres, N., & Kantzavelou, I. (in press)
IoT: Communication protocols and security threats. Internet of Things and Cyber-Physical Systems, https://doi.org/10.1016/j.iotcps.2022.12.003
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. More...
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing
Journal Article
Babaghayou, M., Chaib, N., Lagraa, N., Ferrag, M. A., & Maglaras, L. (2023)
A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing. Sensors, 23(1), Article 531. https://doi.org/10.3390/s23010531
By leveraging the conventional Vehicular Ad-hoc Networks (VANETs), the Internet of Vehicles (IoV) paradigm has attracted the attention of different research and development bo...
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
Journal Article
Almomani, I., Ahmed, M., Kosmanos, D., Alkhayer, A., & Maglaras, L. (2022)
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks. IEEE Access, 10, 131640-131655. https://doi.org/10.1109/access.2022.3229623
Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets,...
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad hoc Networks
Journal Article
Almomani, I., Ahmad, M., Kosmanos, D., Alkhayer, A., & Maglaras, L. (in press)
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad hoc Networks. IEEE Access,
Jamming is a terrifying attack that could harm the 802.11p-based vehicular communications by occupying the communication channels through overwhelming the network with jamming...
Internet of drones security: Taxonomies, open issues, and future directions
Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., …Khan, F. A. (2023)
Internet of drones security: Taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.vehcom.2022.100552
Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast arra...
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity
Journal Article
Maglaras, L. (2022)
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity. Computers, 11(11), Article 159. https://doi.org/10.3390/computers11110159
Combining Security and Reliability of Critical Infrastructures: The Concept of Securability
Journal Article
Maglaras, L., Janicke, H., & Ferrag, M. A. (2022)
Combining Security and Reliability of Critical Infrastructures: The Concept of Securability. Applied Sciences, 12(20), Article 10387. https://doi.org/10.3390/app122010387
DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data
Journal Article
Saidi, H., Labraoui, N., Ari, A. A. A., Maglaras, L. A., & Emati, J. H. M. (2022)
DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data. IEEE Access, 10, 101011-101028. https://doi.org/10.1109/access.2022.3207803
In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite increased attention...
Transforming Points of Single Contact Data into Linked Data
Journal Article
Fragkou, P., & Maglaras, L. (2022)
Transforming Points of Single Contact Data into Linked Data. Computers, 11(8), Article 122. https://doi.org/10.3390/computers11080122
Open data portals contain valuable information for citizens and business. However, searching for information can prove to be tiresome even in portals tackling domains similar ...
Cybersecurity of Critical Infrastructures: Challenges and Solutions
Journal Article
Maglaras, L., Janicke, H., & Ferrag, M. A. (2022)
Cybersecurity of Critical Infrastructures: Challenges and Solutions. Sensors, 22(14), Article 5105. https://doi.org/10.3390/s22145105