Challenges of securing Internet of Things devices: A survey

MG Samaila, M Neto, DAB Fernandes… - Security and …, 2018 - Wiley Online Library
… IoT vision, with security and privacy among the most critical. Ensuring security and privacy in
… These factors are typically at odds with most of the existing security protocols and schemes …

SIT: a lightweight encryption algorithm for secure internet of things

M Usman, I Ahmed, MI Aslam, S Khan… - arXiv preprint arXiv …, 2017 - arxiv.org
… generate mountains of data and the security of data can be a … lightweight encryption algorithm
named as Secure IoT (SIT). It … shows the algorithm provides substantial security in just five …

The future internet of things: Secure, efficient, and model-based

JE Siegel, S Kumar, SE Sarma - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
The Internet of Things' (IoT's) rapid growth is constrained by resource use and fears about
privacy and security. A solution jointly addressing security, efficiency, privacy, and scalability is …

Securing Internet of Things (IoT) with machine learning

S Zeadally, M Tsikerdekis - International Journal of …, 2020 - Wiley Online Library
… The security of these IoT devices has been receiving a lot of … learning techniques in enhancing
the security of IoT devices. … host‐based and network‐based security solutions in the IoT …

A survey of how to use blockchain to secure internet of things and the stalker attack

EF Jesus, VRL Chicarino… - Security and …, 2018 - Wiley Online Library
… , it also increases the risk of exposure to various security and privacy threats; some of these
… of service were the most security threats reported. With the IoT, security threats go far beyond …

Security of the Internet of Things: perspectives and challenges

Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
… the security problems among all other challenges. As IoT is built on the basis of the Internet,
security problems of the Internet … , this paper will analyze the security problems of each layer …

Trust but verify: Auditing the secure Internet of things

J Wilson, RS Wahby, H Corrigan-Gibbs… - Proceedings of the 15th …, 2017 - dl.acm.org
… To that end, this section defines four requirements for a secure and practical IoT auditing
system: … It also describes the threat model against which the security notions are defined, and …

Securing internet of things with software defined networking

K Kalkan, S Zeadally - IEEE Communications Magazine, 2017 - ieeexplore.ieee.org
… help network security analysts and researchers choose the most appropriate security
mechanism according to their security requirements. Additionally, we propose a role based security

A survey of secure internet of things in relation to blockchain

M Alizadeh, K Andersson, O Schelen - … and Information Security  …, 2020 - diva-portal.org
… architectures and security problems. We discuss the use of blockchain as a tool for improving
security in IoT services and networks. We show that blockchain is a secure technology for …

Survey of intrusion detection systems towards an end to end secure internet of things

AA Gendreau, M Moorman - … on future internet of things and …, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the largest technological evolutions of computing, by
2022 it is estimated that a trillion IP addresses (objects) will be connected to the Internet. The …