Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems

M Eceiza, JL Flores, M Iturbe - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
With a growing number of embedded devices that create, transform, and send data
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …

An SDN perspective IoT-Fog security: A survey

S Javanmardi, M Shojafar, R Mohammadi, M Alazab… - Computer Networks, 2023 - Elsevier
The utilization of the Internet of Things (IoT) has burst in recent years. Fog computing is a
notion that solves cloud computing's limitations by offering low latency to IoT network user …

Key challenges in security of iot devices and securing them with the blockchain technology

B Bryant, H Saiedian - Security and Privacy, 2022 - Wiley Online Library
Abstract Internet of Things (IoT) data processing enables rapid access to large volumes of
data with the possibility of improving service‐oriented business models. As such, the rapid …

The internet of things: social dimensions

D Lupton - Sociology Compass, 2020 - Wiley Online Library
Abstract The Internet of Things (IoT) is a vast, dispersed system in which a diverse array of
objects, humans, and other living things is connected via “smart” technologies and the …

A fuzzy logic-based method for incorporating ethics in the internet of things

S Sholla, RN Mir, MA Chishti - International Journal of Ambient …, 2021 - igi-global.com
IoT is expected to have far-reaching consequences on society due to a wide spectrum of
applications like smart healthcare, smart transportation, smart agriculture, smart home, etc …

Adaptive XACML access policies for heterogeneous distributed IoT environments

K Riad, J Cheng - Information Sciences, 2021 - Elsevier
This paper addresses the access control issue for the comprehensive and distributed
Internet of Things (IoT) environments. The typical eXtensible Access Control Markup …

[HTML][HTML] Reducing risk to security and privacy in the selection of trigger-action rules: Implicit vs. explicit priming for domestic smart devices

PL Morgan, EIM Collins, T Spiliotopoulos… - International Journal of …, 2022 - Elsevier
Smart home device usage is increasing, as is the diversity of users and range of devices.
Additionally, it is becoming increasingly common to interconnect devices (eg, via trigger …

[PDF][PDF] Proposing a novel iot framework by identifying security and privacy issues in fog cloud services network

FH Khoso, AA Arain, A Lakhan, A Kehar, SZ Nizamani - Int. J, 2021 - academia.edu
These days, the Internet of Things applications are growing progressively. However, the
existing frameworks for IoT applications are not satisfied the security, allocation, and …

Evaluating Security Principals and Technologies to Overcome Security Threats in IoT World

J Singh, G Singh, S Negi - 2023 2nd International Conference …, 2023 - ieeexplore.ieee.org
There will be a billion smart devices with processing, sensing, and actuation capabilities that
can be connected to the Internet under the IoT paradigm. The level of convenience …

Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach

ED Alalade, M Mahyoub, A Matrawy - arXiv preprint arXiv:2401.09519, 2024 - arxiv.org
Addressing trust concerns in Smart Home (SH) systems is imperative due to the limited study
on preservation approaches that focus on analyzing and evaluating privacy threats for …