A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… Similarly, several studies have proposed lightweight mitigation techniques for version …
trust management techniques in the Internet of Things,” IEEE Internet Things J., vol. 6, no. 6, pp. …

Autonomic schemes for threat mitigation in Internet of Things

QM Ashraf, MH Habaebi - Journal of Network and Computer Applications, 2015 - Elsevier
… Over the years, many researchers have proposed threat mitigation … More particularly, this
paper looks at threat mitigation … This article aims to discuss various threat mitigation approaches …

Routing attacks and mitigation methods for RPL-based Internet of Things

A Raoof, A Matrawy, CH Lung - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
mitigation techniques for RPL. In this survey, we will focus on the routing attacks on RPL and
their mitigation methods, whether these mitigation … RPL’s attacks mitigation methods. To our …

Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques

A Mihoub, OB Fredj, O Cheikhrouhou, A Derhab… - Computers & Electrical …, 2022 - Elsevier
techniques. We propose a new architecture composed of two components: DoS/DDoS detection
and DoS/DDoS mitigation… In this way, it is possible to apply the corresponding mitigation

[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention

M Humayun, NZ Jhanjhi, A Alsayat… - Egyptian Informatics …, 2021 - Elsevier
Internet of things playing a vital role in bridging this gap … on evolution, prevention and mitigation
of Ransomware in IoT … , Existing techniques to prevent and mitigate Ransomware attacks …

Internet of Things: Evolution and technologies from a security perspective

R Ande, B Adebisi, M Hammoudeh, J Saleem - Sustainable Cities and …, 2020 - Elsevier
… seeks to highlight IoT cyber security vulnerabilities and mitigation techniques to the reader.
… and mitigation techniques suggested. Technologies within IoT systems including Things, …

Toward a distributed approach for detection and mitigation of denial-of-service attacks within industrial internet of things

V Borgiani, P Moratori, JF Kazienko… - … Internet of Things …, 2020 - ieeexplore.ieee.org
mitigation times when compared to a previous centralized approach, so-called ConCReCT.
Our results indicate that DConCReCT may be applied in the mitigation … node traffic mitigation

Risk and threat mitigation techniques in internet of things (IoT) environments: a survey

M Salayma - Frontiers in The Internet of Things, 2024 - frontiersin.org
mitigation techniques applied across different IoT application contexts, and elaborates on
how to apply each mitigation technique, … in discussing mitigation techniques proposed for the …

DDoS attack mitigation in Internet of Things using software defined networking

ME Ahmed, H Kim - … IEEE third international conference on big …, 2017 - ieeexplore.ieee.org
… In order to implement our idea, we discuss how to mitigate DDoS attacks using the features
… DDoS mitigation using SDN inter-domain information exchange. It is claimed that the Internet

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
… Therefore, a detailed review of security attacks towards WSNs and IoT, along with the
techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In …