Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …

Consumer IoT: Security vulnerability case studies and solutions

T Alladi, V Chamola, B Sikdar… - IEEE Consumer …, 2020 - ieeexplore.ieee.org
As consumer Internet of Things (IoT) devices become increasingly pervasive in our society,
there is a need to understand the underpinning security risks. Therefore, in this article, we …

Surveillance capitalism and the challenge of collective action

S Zuboff - New labor forum, 2019 - journals.sagepub.com
12 New Labor Forum 28 (1) that its excesses might be perceived as the inexorable
expression of the machines it employs. Surveillance capitalists are no exception. For …

A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …

An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security

W Iqbal, H Abbas, M Daneshmand… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …

PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities

I Makhdoom, I Zhou, M Abolhasan, J Lipman, W Ni - Computers & Security, 2020 - Elsevier
The ubiquitous use of Internet of Things (IoT) ranges from industrial control systems to e-
Health, e-commerce, smart cities, agriculture, supply chain management, smart cars, cyber …

A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services

I Stellios, P Kotzanikolaou, M Psarakis… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no
surprise that many recent cyber attacks are IoT-enabled: the attacker initially exploits some …

The age of surveillance capitalism

S Zuboff - Social theory re-wired, 2023 - taylorfrancis.com
Behavioral surplus defines Google's earnings success. In 2016, 89 percent of the revenues
of its parent company, Alphabet, derived from Google's targeted advertising programs. The …