Internet of Things: Concepts, architectures and technologies

F Viel, LA Silva, RQV Leithardt… - 2018 13th IEEE …, 2018 - ieeexplore.ieee.org
Internet of Things-IoT-has opened up opportunities for the development of new applications
in various segments, being one of the drivers of the revolutions that are occurring in cities …

Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning

P Spadaccino, F Cuomo - arXiv preprint arXiv:2012.01174, 2020 - arxiv.org
Key components of current cybersecurity methods are the Intrusion Detection Systems
(IDSs) were different techniques and architectures are applied to detect intrusions. IDSs can …

IoT security: A layered approach for attacks & defenses

MM Ahemd, MA Shah, A Wahid - 2017 international conference …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) has been a massive advancement in the Information and
Communication Technology (ICT). It is projected that over 50 billion devices will become …

Shielding IoT against cyber‐attacks: an event‐based approach using SIEM

D Diaz Lopez, M Blanco Uribe… - Wireless …, 2018 - Wiley Online Library
Due to the growth of IoT (Internet of Things) devices in different industries and markets in
recent years and considering the currently insufficient protection for these devices, a security …

Analysis of security issues and countermeasures for the industrial internet of things

S Pal, Z Jadidi - Applied Sciences, 2021 - mdpi.com
Industrial Internet of Things (IIoT) can be seen as an extension of the Internet of Things (IoT)
services and applications to industry with the inclusion of Industry 4.0 that provides …

Towards a secure Internet of Things: A comprehensive study of second line defense mechanisms

M Dutta, J Granjal - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) exemplifies a large network of sensing and actuating devices
that have penetrated into the physical world enabling new applications like smart homes …

Enforcing security in Internet of Things frameworks: A systematic literature review

M Aly, F Khomh, M Haoues, A Quintero, S Yacout - Internet of Things, 2019 - Elsevier
With the rise of the Internet of Things (IoT) technology, the number of IoT devices/sensors
has increased significantly. It is anticipated that large-scale sensor-based systems will …

Classifying security attacks in IoT networks using supervised learning

C Ioannou, V Vassiliou - 2019 15th International conference on …, 2019 - ieeexplore.ieee.org
Machine learning models have long be proposed to detect the presence of unauthorized
activity within computer networks. They are used as anomaly detection techniques to detect …

On the design of IoT security: Analysis of software vulnerabilities for smart grids

CM Mathas, C Vassilakis, N Kolokotronis… - Energies, 2021 - mdpi.com
The 5G communication network will underpin a vast number of new and emerging services,
paving the way for unprecedented performance and capabilities in mobile networks. In this …

[HTML][HTML] A roadmap for security challenges in the Internet of Things

AR Sfar, E Natalizio, Y Challal, Z Chtourou - Digital Communications and …, 2018 - Elsevier
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT)
context are playing an active role in human activities, systems and processes. The high …