Securing the internet of things in the age of machine learning and software-defined networking

F Restuccia, S D'oro, T Melodia - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) realizes a vision where billions of interconnected devices are
deployed just about everywhere, from inside our bodies to the most remote areas of the …

A survey on internet of things security from data perspectives

J Hou, L Qu, W Shi - Computer Networks, 2019 - Elsevier
Abstract As the Internet of Things (IoT) sees an increasing use in the society, the security
challenge it faces is becoming more and more severe. Data collected and shared in the IoT …

Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication

A Diro, H Reda, N Chilamkurti, A Mahmood… - IEEE …, 2020 - ieeexplore.ieee.org
The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a
significant challenge for securing IoT applications. This necessitates a robust and …

iTLS: Lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy

P Li, J Su, X Wang - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Enabling end-to-end secure communication is essential for many Internet-of-Things (IoT)
application scenarios. Transport-layer security (TLS) and datagram TLS (DTLS) are the de …

[HTML][HTML] LDAKM-EIoT: Lightweight device authentication and key management mechanism for edge-based IoT deployment

M Wazid, AK Das, S Shetty, J JPC Rodrigues, Y Park - Sensors, 2019 - mdpi.com
In recent years, edge computing has emerged as a new concept in the computing paradigm
that empowers several future technologies, such as 5G, vehicle-to-vehicle communications …

Understanding security requirements and challenges in Internet of Things (IoT): A review

S Hameed, FI Khan, B Hameed - Journal of Computer Networks …, 2019 - Wiley Online Library
Internet of things (IoT) is realized by the idea of free flow of information amongst various low‐
power embedded devices that use the Internet to communicate with one another. It is …

IoT-HarPSecA: a framework and roadmap for secure design and development of devices and applications in the IoT space

MG Samaila, JBF Sequeiros, T Simoes… - IEEE …, 2020 - ieeexplore.ieee.org
The past couple of years have marked continued growth in the applications and services of
the Internet of Things (IoT). This has attracted the attention of new operators as well as …

[HTML][HTML] Securing wireless communications of the internet of things from the physical layer, an overview

J Zhang, TQ Duong, R Woods, A Marshall - Entropy, 2017 - mdpi.com
The security of the Internet of Things (IoT) is receiving considerable interest as the low
power constraints and complexity features of many IoT devices are limiting the use of …

[图书][B] Securing the internet of things

S Li, L Da Xu - 2017 - books.google.com
Securing the Internet of Things provides network and cybersecurity researchers and
practitioners with both the theoretical and practical knowledge they need to know regarding …

[PDF][PDF] Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network

C Zhang, R Green - Proceedings of the 18th symposium on …, 2015 - researchgate.net
The idea of Internet of Things (IoT) is implanting networked heterogeneous detectors into
our daily life. It opens extra channels for information submission and remote control to our …