A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities

K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
systematic survey on the security requirements of the IIoT. As we quantitatively demonstrate
in Section VI, the field of IIoT security … for an up-to-date systematic survey. In particular, as our …

Internet of Things applications: A systematic review

P Asghari, AM Rahmani, HHS Javadi - Computer Networks, 2019 - Elsevier
… Furthermore, in this paper, the requirements of adaptive security management and … the
security needs, and also applying the sufficient security controls in condition of changing security

A survey on internet of things security: Requirements, challenges, and solutions

H HaddadPajouh, A Dehghantanha, RM Parizi… - Internet of Things, 2021 - Elsevier
security problems. In addition, we propose a three layer-based taxonomy for mapping security
requirements … identified security requirements, challenges, and solutions from a top-down …

Understanding security requirements and challenges in Internet of Things (IoT): A review

S Hameed, FI Khan, B Hameed - Journal of Computer Networks …, 2019 - Wiley Online Library
… Key future security requirements for smart home systems are discussed. Also, the authors
suggested a suitable security architecture for IoT. The gateway architecture is nominated to be …

Securing the Internet of Things: Challenges, threats and solutions

PIR Grammatikis, PG Sarigiannidis, ID Moscholios - Internet of Things, 2019 - Elsevier
… After determining the security requirements and the challenges that the IoT generates,
we focus our attention on the potential threats and the corresponding countermeasures. In …

The application of internet of things in healthcare: a systematic literature review and classification

H Ahmadi, G Arji, L Shahmoradi, R Safdari… - Universal Access in the …, 2019 - Springer
… To the best of our knowledge, there is no systematic review of the literature addressing IoT
architecture in healthcare. The aim of this systematic review is to present a complete survey …

A survey of machine and deep learning methods for internet of things (IoT) security

MA Al-Garadi, A Mohamed, AK Al-Ali… - … surveys & tutorials, 2020 - ieeexplore.ieee.org
… between devices to security-based intelligence systems. The goal … methods and recent
advances in DL methods that can be used to develop enhanced security methods for IoT systems. …

Challenges and opportunities in securing the industrial internet of things

M Serror, S Hack, M Henze, M Schuba… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… As a preliminary step toward securing the IIoT, we first need to outline the specific security
goals for IIoT deployments. Therefore, we begin with a description of the security requirements

An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security

W Iqbal, H Abbas, M Daneshmand… - … Internet of Things …, 2020 - ieeexplore.ieee.org
… reviews the threats, security requirements, challenges, and the … We further elaborated
SDN-based IoT security solutions to … homes against Internet traffic analysis,” IEEE Internet Things J.…

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

A Khraisat, A Alazab - Cybersecurity, 2021 - Springer
… We also review how existing IoT IDS detect intrusive attacks and secure communications
on the IoT. It also presents the classification of IoT … IoT intrusion detection systems methods