Application specific internet of things (ASIoTs): Taxonomy, applications, use case and future directions

KLM Ang, JKP Seng - IEEE Access, 2019 - ieeexplore.ieee.org
… Although the security requirements for the IoMT may not be as stringent as for the IoBT, the
security and privacy of the patients’ records also require protection from unauthorized access. …

Design guidelines for machine learning-based cybersecurity in internet of things

A Boukerche, RWL Coutinho - IEEE Network, 2020 - ieeexplore.ieee.org
… (ML)-based solutions to secure the Internet of things (IoT). We described the fundamental
design requirements and challenges of cybersecurity solutions for IoT. Hence, we discussed …

Designing privacy-aware internet of things applications

C Perera, M Barhamgi, AK Bandara, M Ajmal… - Information …, 2020 - Elsevier
… This intertwining of security and privacy issues, means that privacy needs to be considered
as a key requirement for IoT applications. However, thus far, privacy concerns have not been …

Safety, security, and privacy threats posed by accelerating trends in the internet of things

K Fu, T Kohno, D Lopresti, E Mynatt… - arXiv preprint arXiv …, 2020 - arxiv.org
The Internet of Things (IoT) is already transforming industries, cities, and homes. The economic
value of this transformation across all industries is estimated to be trillions of dollars and …

Internet of Things security threats and key technologies

SA Fadhil - Journal of Discrete Mathematical Sciences and …, 2021 - Taylor & Francis
security solutions at the application layer is also different and different in synthesis. The
security requirements … The key technology of application layer security can include two aspects. …

A survey on security and privacy issues in edge-computing-assisted internet of things

A Alwarafy, KA Al-Thelaya, M Abdallah… - … Internet of Things …, 2020 - ieeexplore.ieee.org
… types of security and privacy mechanisms, requirements, and … Yao, “Security and privacy
preservation scheme of face … in Internet of Things,” IEEE Internet Things J., vol. 4, no. 5, pp. …

[PDF][PDF] Exploring data security and privacy issues in internet of things based on five-layer architecture

PR Kumar, AT Wan, WSH Suhaili - … and information security, 2020 - researchgate.net
… IoT security requirements [10]. In Table 3, IoT properties are given in the column and the …
security requirements are given in the row. The first IoT security requirement, network security is …

A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review

U Tariq, I Ahmed, AK Bashir, K Shaukat - Sensors, 2023 - mdpi.com
… when designing security measures. On the other hand, classical wireless networks and
devices may have different requirements and capabilities. While some security principles may …

AI-based joint optimization of QoS and security for 6G energy harvesting Internet of Things

B Mao, Y Kawamoto, N Kato - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… -level security protections consume too much energy even though the security requirement
may be … ensemble classification for face recognition,” IEEE Internet Things J., vol. 6, no. 3, pp. …

Machine learning based solutions for security of Internet of Things (IoT): A survey

SM Tahsien, H Karimipour, P Spachos - Journal of Network and Computer …, 2020 - Elsevier
Over the last decade, IoT platforms have been developed into a global giant that grabs every
aspect of our daily lives by advancing human life with its unaccountable smart services. …