Author:
Yadav Sohan K.,Jha Sudhanshu K.,Singh Sudhakar,Dixit Pratibha,Prakash Shiv
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference54 articles.
1. Kozma, D., Varga, P., & Larrinaga, F. (2019). Data-driven Workflow Management by utilising BPMN and CPN in IIoT Systems with the Arrowhead Framework, in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, Sep. 2019, vol. 2019-Septe, pp. 385–392, https://doi.org/10.1109/ETFA.2019.8869501.
2. Sengupta, J., Ruj, S., & Das Bit, S. (2020). A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, 102481. https://doi.org/10.1016/j.jnca.2019.102481. Academic Press.
3. Tanwar, S., Vora, J., Tyagi, S., Kumar, N., & Obaidat, M. S. (2018). A systematic review on security issues in vehicular ad hoc network. Security and Privacy, 1(5), 39. https://doi.org/10.1002/spy2.39
4. Yinbiao, S., et al. (2014) Internet of things: Wireless sensor networks, International Electronic Commision, no. December, pp. 1–78.
5. Lu, C. (2014). Overview of security and privacy issues in the internet of things, pp. 1–11.