A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… systematic survey on the security requirements of the IIoT. As we quantitatively demonstrate
in Section VI, the field of IIoT security … for an up-to-date systematic survey. In particular, as our …
in Section VI, the field of IIoT security … for an up-to-date systematic survey. In particular, as our …
Internet of Things applications: A systematic review
… Furthermore, in this paper, the requirements of adaptive security management and … the
security needs, and also applying the sufficient security controls in condition of changing security …
security needs, and also applying the sufficient security controls in condition of changing security …
A survey on internet of things security: Requirements, challenges, and solutions
… security problems. In addition, we propose a three layer-based taxonomy for mapping security
requirements … identified security requirements, challenges, and solutions from a top-down …
requirements … identified security requirements, challenges, and solutions from a top-down …
Understanding security requirements and challenges in Internet of Things (IoT): A review
… Key future security requirements for smart home systems are discussed. Also, the authors
suggested a suitable security architecture for IoT. The gateway architecture is nominated to be …
suggested a suitable security architecture for IoT. The gateway architecture is nominated to be …
Securing the Internet of Things: Challenges, threats and solutions
… After determining the security requirements and the challenges that the IoT generates,
we focus our attention on the potential threats and the corresponding countermeasures. In …
we focus our attention on the potential threats and the corresponding countermeasures. In …
The application of internet of things in healthcare: a systematic literature review and classification
… To the best of our knowledge, there is no systematic review of the literature addressing IoT
architecture in healthcare. The aim of this systematic review is to present a complete survey …
architecture in healthcare. The aim of this systematic review is to present a complete survey …
A survey of machine and deep learning methods for internet of things (IoT) security
… between devices to security-based intelligence systems. The goal … methods and recent
advances in DL methods that can be used to develop enhanced security methods for IoT systems. …
advances in DL methods that can be used to develop enhanced security methods for IoT systems. …
Challenges and opportunities in securing the industrial internet of things
… As a preliminary step toward securing the IIoT, we first need to outline the specific security
goals for IIoT deployments. Therefore, we begin with a description of the security requirements …
goals for IIoT deployments. Therefore, we begin with a description of the security requirements …
An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security
… reviews the threats, security requirements, challenges, and the … We further elaborated
SDN-based IoT security solutions to … homes against Internet traffic analysis,” IEEE Internet Things J.…
SDN-based IoT security solutions to … homes against Internet traffic analysis,” IEEE Internet Things J.…
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
A Khraisat, A Alazab - Cybersecurity, 2021 - Springer
… We also review how existing IoT IDS detect intrusive attacks and secure communications
on the IoT. It also presents the classification of IoT … IoT intrusion detection systems methods …
on the IoT. It also presents the classification of IoT … IoT intrusion detection systems methods …