Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems
With a growing number of embedded devices that create, transform, and send data
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …
An SDN perspective IoT-Fog security: A survey
The utilization of the Internet of Things (IoT) has burst in recent years. Fog computing is a
notion that solves cloud computing's limitations by offering low latency to IoT network user …
notion that solves cloud computing's limitations by offering low latency to IoT network user …
Key challenges in security of iot devices and securing them with the blockchain technology
B Bryant, H Saiedian - Security and Privacy, 2022 - Wiley Online Library
Abstract Internet of Things (IoT) data processing enables rapid access to large volumes of
data with the possibility of improving service‐oriented business models. As such, the rapid …
data with the possibility of improving service‐oriented business models. As such, the rapid …
The internet of things: social dimensions
D Lupton - Sociology Compass, 2020 - Wiley Online Library
Abstract The Internet of Things (IoT) is a vast, dispersed system in which a diverse array of
objects, humans, and other living things is connected via “smart” technologies and the …
objects, humans, and other living things is connected via “smart” technologies and the …
A fuzzy logic-based method for incorporating ethics in the internet of things
IoT is expected to have far-reaching consequences on society due to a wide spectrum of
applications like smart healthcare, smart transportation, smart agriculture, smart home, etc …
applications like smart healthcare, smart transportation, smart agriculture, smart home, etc …
Adaptive XACML access policies for heterogeneous distributed IoT environments
This paper addresses the access control issue for the comprehensive and distributed
Internet of Things (IoT) environments. The typical eXtensible Access Control Markup …
Internet of Things (IoT) environments. The typical eXtensible Access Control Markup …
[HTML][HTML] Reducing risk to security and privacy in the selection of trigger-action rules: Implicit vs. explicit priming for domestic smart devices
PL Morgan, EIM Collins, T Spiliotopoulos… - International Journal of …, 2022 - Elsevier
Smart home device usage is increasing, as is the diversity of users and range of devices.
Additionally, it is becoming increasingly common to interconnect devices (eg, via trigger …
Additionally, it is becoming increasingly common to interconnect devices (eg, via trigger …
[PDF][PDF] Proposing a novel iot framework by identifying security and privacy issues in fog cloud services network
These days, the Internet of Things applications are growing progressively. However, the
existing frameworks for IoT applications are not satisfied the security, allocation, and …
existing frameworks for IoT applications are not satisfied the security, allocation, and …
Evaluating Security Principals and Technologies to Overcome Security Threats in IoT World
J Singh, G Singh, S Negi - 2023 2nd International Conference …, 2023 - ieeexplore.ieee.org
There will be a billion smart devices with processing, sensing, and actuation capabilities that
can be connected to the Internet under the IoT paradigm. The level of convenience …
can be connected to the Internet under the IoT paradigm. The level of convenience …
Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach
Addressing trust concerns in Smart Home (SH) systems is imperative due to the limited study
on preservation approaches that focus on analyzing and evaluating privacy threats for …
on preservation approaches that focus on analyzing and evaluating privacy threats for …