Fortifying the IoT landscape: Strategies to counter security risks in connected systems

E James, F Rabbi - Tensorgate Journal of Sustainable …, 2023 - research.tensorgate.org
The proliferation of Internet of Things (IoT) devices in our connected world has brought
unparalleled convenience and efficiency to various sectors, ranging from smart homes to …

IoT best practices and their components: A systematic literature review

CMM Otalvaro, JCB Andrade… - IEEE Latin America …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is a technology that consists of interconnected entities (intelligent
physical objects, services and software systems) via the Internet, which serve automatically …

Energy efficient cross-layer approach for object security of CoAP for IoT devices

RH Randhawa, A Hameed, AN Mian - Ad Hoc Networks, 2019 - Elsevier
CoAP is an application layer protocol designed for resource-constrained devices in Internet-
of-Things (IoT). Object Security of CoAP (OSCoAP) is an IETF draft for addressing security …

Car hacking: Accessing and exploiting the can bus protocol

BR Payne - Journal of Cybersecurity Education …, 2019 - digitalcommons.kennesaw.edu
With the rapid adoption of internet-connected and driver-assist technologies, and the spread
of semi-autonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a …

Multiple-extortion ransomware: The case for active cyber threat intelligence

B Payne, E Mienie - ECCWS 2021 20th European Conference on …, 2021 - books.google.com
In just over three decades since its introduction, ransomware has become a primary security
risk to businesses and users, and it is now the fastest-growing category of cybercrime. In …

A Multi-layer Security approach for DDoS detection in Internet of Things

AB Feroz Khan - International Journal of Intelligent Unmanned …, 2021 - emerald.com
Purpose The purpose of the paper is to analyze the layer wise security issues in IoT and to
obtain the effective security mechanism for jamming attack. Design/methodology/approach …

Unleashing iot security: Assessing the effectiveness of best practices in protecting against threats

P Pütz, R Mitev, M Miettinen, AR Sadeghi - Proceedings of the 39th …, 2023 - dl.acm.org
The Internet of Things (IoT) market is rapidly growing and is expected to double from 2020 to
2025. The increasing use of IoT devices, particularly in smart homes, raises crucial concerns …

Cellular IoT based secure monitoring system for smart environments

K Saleem, FY Alfariheedi, R Ouni… - … Conference on E …, 2022 - ieeexplore.ieee.org
In this paper, a remote monitoring system enabled with the smart internet of things (IoT)
station for ambient assisted living (AAL) and smart environments is introduced. IoT station …

[PDF][PDF] Representación formal de mejores prácticas de IoT con base en los elementos del núcleo de la Esencia SEMAT

CMM Otálvaro, JCB Andrade - 2023 - repositorio.utp.edu.co
La tecnología IoT es uno de los pilares clave de la cuarta revolución industrial porque tiene
un importante potencial en innovaciones y beneficios útiles para toda la población. Sus …

Internet of things: Illuminating and study of protection and justifying potential countermeasures

N Chouhan, HK Saini, SC Jain - … : Proceedings of ICSCSP 2018, Volume 2, 2019 - Springer
Abstract Presently, Internet of things (IoTs) contains environs with explore in innumerable
mixed plans are linked by the classes of Internet. That decides the plans in novel capability …