Internet of Things: A comprehensive study of security issues and defense mechanisms

TA Ahanger, A Aljumah - IEEE Access, 2018 - ieeexplore.ieee.org
… The main aim of this study is to analyze the security challenges and defense mechanisms
against those challenges related to Internet of Things (IoT). The other objective of this study is …

A review of moving target defense mechanisms for internet of things applications

N Saputro, S Tonyali, A Aydeger… - … Internet of Things, 2020 - Wiley Online Library
… and a patch and/ or a defense mechanism against an attack that exploits this vulnerability is
… tication to outsmart the newly developed defense mechanism. This situation is driven by the …

Towards a secure Internet of Things: A comprehensive study of second line defense mechanisms

M Dutta, J Granjal - IEEE Access, 2020 - ieeexplore.ieee.org
… nature, second line of defense mechanisms are crucial to ensure security in … defense
mechanisms for standardized protocols in IoT networks. The paper analyzes existing mechanisms

Modeling and analysis of integrated proactive defense mechanisms for internet of things

M Ge, JH Cho, B Ishfaq, DS Kim - … of Secure Internet of Things, 2020 - Wiley Online Library
… in which a granularity of each defense mechanism is omitted to capture a … defense system
equipped with two proposed defense … integrated and proactive defense mechanisms that can …

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities

M Ge, JB Hong, SE Yusuf, DS Kim - Future Generation Computer Systems, 2018 - Elsevier
… ), we develop two proactive defense mechanisms that reconfigure the IoT network topology.
… The results show our proactive defense mechanisms in the SD-IoT effectively increase the …

Optimal deployments of defense mechanisms for the internet of things

M Ge, JH Cho, CA Kamhoua… - … Secure Internet of Things …, 2018 - ieeexplore.ieee.org
… , bypass multiple layers of defense mechanisms, and exploit … defense mechanisms to
increase the security of the IoT networks and investigate how to deploy these defense mechanisms

A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
… In addition, the existing defense mechanisms are divided into two categories: secure
protocol and intrusion detection system. The authors critically analysed the proposed solutions, …

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
… Understanding these attacks and their associated defense mechanisms will help paving
a secure path towards the proliferation and public acceptance of IoT technology. …

A root-based defense mechanism against RPL blackhole attacks in internet of things networks

J Jiang, Y Liu, B Dezfouli - 2018 Asia-Pacific Signal and …, 2018 - ieeexplore.ieee.org
… Therefore, in this work, we propose a lightweight defense mechanism based on RPL
routing protocol to detect Blackhole attacks and exclude the detected malicious nodes from the …

Information fusion to defend intentional attack in internet of things

PY Chen, SM Cheng, KC Chen - IEEE Internet of Things journal, 2014 - ieeexplore.ieee.org
… , defense mechanism, and network resilience are specified in Section IV. The vulnerabilities
of the Internet-… In Section VI, we formulate the fusion-based defense mechanism via optimal …