[HTML][HTML] Analysis of IoT security challenges and its solutions using artificial intelligence

T Mazhar, DB Talpur, TA Shloul, YY Ghadi, I Haq… - Brain Sciences, 2023 - mdpi.com
The Internet of Things (IoT) is a well-known technology that has a significant impact on many
areas, including connections, work, healthcare, and the economy. IoT has the potential to …

Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future

SF Ahmed, S Shuravi, A Bhuyian, S Afrin… - arXiv preprint arXiv …, 2023 - arxiv.org
Given the exponential expansion of the internet, the possibilities of security attacks and
cybercrimes have increased accordingly. However, poorly implemented security …

[HTML][HTML] TrackInk: An IoT-enabled real-time object tracking system in space

C Aume, K Andrews, S Pal, A James, A Seth… - Sensors, 2022 - mdpi.com
Nowadays, there is tremendous growth in the Internet of Things (IoT) applications in our
everyday lives. The proliferation of smart devices, sensors technology, and the Internet …

[HTML][HTML] The Application of role-based framework in preventing internal identity theft related crimes: A qualitative case study of UK retail companies

RI Okeke, MH Eiza - Information Systems Frontiers, 2023 - Springer
This paper aims to examine the challenges of preventing internal identity theft related crimes
(IIDTRC) in the UK retail sector. Using an in-depth multiple case studies of a selected …

[HTML][HTML] A survey on MAC-based physical layer security over wireless sensor network

AU Rehman, MS Mahmood, S Zafar, MA Raza… - Electronics, 2022 - mdpi.com
Physical layer security for wireless sensor networks (WSNs) is a laborious and highly critical
issue in the world. Wireless sensor networks have great importance in civil and military fields …

[HTML][HTML] Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion

HSA Belkhira, M Belkheir, M Rouissat… - Open Information …, 2024 - degruyter.com
The security landscape of Internet of Things (IoT) networks continues to draw significant
attention from recent networks; the Version Number Attack (VNA) stands out as a prominent …

Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies

K Kaur, A Kaur, Y Gulzar, V Gandhi - Frontiers in Computer Science, 2024 - frontiersin.org
The Internet of Things (IoT) is a collection of devices such as sensors for collecting data,
actuators that perform mechanical actions on the sensor's collected data, and gateways …

Soft Computing: Goals, importance and various problem-solving techniques

R Agrawal, O Sharma, NO Aljehane… - Journal of Integrated …, 2023 - pubs.thesciencein.org
The purpose, importance, approach, qualities, and requirement of soft computing are all
discussed in this study. Apart from that, the paper describes the work of numerous writers in …

Blockchain-based AI Methods for Managing Industrial IoT: Recent Developments, Integration Challenges and Opportunities

A Rahman, D Kundu, T Debnath, M Rahman… - arXiv preprint arXiv …, 2024 - arxiv.org
Currently, Blockchain (BC), Artificial Intelligence (AI), and smart Industrial Internet of Things
(IIoT) are not only leading promising technologies in the world, but also these technologies …

Security Threat Exploration on Smart Living Style based on Twitter Data

T AlSaedi, M Mehmood, A Mahmood… - … , Technology & Applied …, 2024 - etasr.com
Abstract The Internet of Things (IoT) has revolutionized individuals' homes with smart
devices, but it has also brought security worries due to the huge amounts of data they …