1.
Castillón, D. C., Martín, J. C., Suarez, D. P. M., Martínez, Á. R., & Álvarez, V. L. (2020). Automation trends in industrial networks and IIoT. Industrial IoT: Challenges, Design Principles, Applications, and Security, 161-187.
2.
Javaid, M., Haleem, A., Singh, R. P., Rab, S., & Suman, R. (2021). Upgrading the manufacturing sector via applications of industrial internet of things (IIoT). Sensors International, 2, 100129.
3.
Salama, R., Altrjman, C., & Al-Turjman, F. (2023). An overview of the Internet of Things (IoT) and Machine to Machine (M2M) Communications. NEU Journal for Artificial Intelligence and Internet of Things, 2(3).
4.
Khan, A. S., Yahya, M. I. B., Zen, K. B., Abdullah, J. B., Rashid, R. B. A., Javed, Y., ... & Mostafa, A. M. (2023). Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network. IEEE Access, 11, 20524-20541.
5.
Leminen, S., Rajahonka, M., Wendelin, R., & Westerlund, M. (2020). Industrial internet of things business models in the machine-to-machine context. Industrial marketing management, 84, 298-311.
6.
Mamdouh, M., Awad, A. I., Khalaf, A. A., & Hamed, H. F. (2021). Authentication and identity management of IoHT devices: achievements, challenges, and future directions. Computers & Security, 111, 102491.
7.
Wang, Y., Li, H., Huang, T., Zhang, X., & Bai, Y. (2021). Scalable identifier system for industrial internet based on multi-identifier network architecture. IEEE Internet of Things Journal.
8.
Wan, Z., Liu, W., & Cui, H. (2022). HIBEChain: A hierarchical identity-based blockchain system for large-scale IoT. IEEE Transactions on Dependable and Secure Computing, 20(2), 1286-1301.
9.
Singh, J., Rastogi, U., Goel, Y., & Gupta, B. (2023). Blockchain-based decentralized voting system security Perspective: Safe and secure for digital voting system. arXiv preprint arXiv:2303.06306.
10.
Noh, J., Kwon, Y., Son, J., & Cho, S. (2022). Blockchain-based one-time authentication for secure v2x communication against insiders and authority compromise attacks. IEEE Internet of Things Journal, 10(7), 6235-6248.
11.
Deebak, B. D., Memon, F. H., Khowaja, S. A., Dev, K., Wang, W., Qureshi, N. M. F., & Su, C. (2022). A Lightweight Blockchain-Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems. IEEE Internet of Things Journal, 10(8), 6652-6660.
12.
Philipp, A., & Küpper, A. (2023). DAXiot: A Decentralized Authentication and Authorization Scheme for Dynamic IoT Networks. arXiv preprint arXiv:2307.06919.
13.
Fan, M., Zhang, Z., Li, Z., Sun, G., Yu, H., & Guizani, M. (2023). Blockchain-Based Decentralized and Lightweight Anonymous Authentication for Federated Learning. IEEE Transactions on Vehicular Technology.
14.
Zhang, J., & Datta, A. (2023). Blockchain-enabled Data Governance for Privacy-Preserved Sharing of Confidential Data. arXiv e-prints, arXiv-2309.
15.
Usmonov, M. T. O. G. L. (2021). Autentification, authorization and administration. Science and Education, 2(7), 233-242.
16.
Wu, Y., Dai, H. N., & Wang, H. (2020). Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0. IEEE Internet of Things Journal, 8(4), 2300-2317.
17.
Lin, C. C., Tsai, C. T., Liu, Y. L., Chang, T. T., & Chang, Y. S. (2023). Security and privacy in 5g-iiot smart factories: Novel approaches, trends, and challenges. Mobile Networks and Applications, 1-16.
18.
Khan, N. A. (2022). 5G Network: Techniques to Increase Quality of Service and Quality of Experience. Int. J. Comput. Netw. Appl (IJCNA), 9, 476-496.
19.
Karamitsos, I., Papadaki, M., Al-Hussaeni, K., & Kanavos, A. (2023). Transforming Airport Security: Enhancing Efficiency through Blockchain Smart Contracts. Electronics, 12(21), 4492.
20.
Igboanusi, I. S., Dirgantoro, K. P., Lee, J. M., & Kim, D. S. (2021). Blockchain side implementation of pure wallet (pw): An offline transaction architecture. ICT Express, 7(3), 327-334.
21.
Khan, N. A. (2022). PKI-Based security enhancement for IoT in 5G networks. In Inventive Computation and Information Technologies: Proceedings of ICICIT 2021 (pp. 217-225). Singapore: Springer Nature Singapore.
22.
Khan, N. A., & Al Qurashi, M. (2023). Security Tradeoff in Network Virtualization and Their Countermeasures. In Inventive Computation and Information Technologies: Proceedings of ICICIT 2022 (pp. 741-749). Singapore: Springer Nature Singapore.
23.
Prewett, K. W., Prescott, G. L., & Phillips, K. (2020). Blockchain adoption is inevitable—Barriers and risks remain. Journal of Corporate accounting & finance, 31(2), 21-28.
24.
Khan, A. S., Javed, Y., Saqib, R. M., Ahmad, Z., Abdullah, J., Zen, K., & Khan, N. A. (2022). Lightweight multifactor authentication scheme for nextgen cellular networks. IEEE access, 10, 31273-31288.
25.
Wang, W., Xu, H., Alazab, M., Gadekallu, T. R., Han, Z., & Su, C. (2021). Blockchain-based reliable and efficient certificateless signature for IioT devices. IEEE transactions on industrial informatics, 18(10), 7059-7067.