Security trends in Internet of Things: A survey

Rachit, S Bhatt, PR Ragiri - SN Applied Sciences, 2021 - Springer
Abstract The Internet of Things (IoT) is a network of embedded devices that are uniquely
identifiable and have embedded software required to communicate between the transient …

A taxonomy of cyber-physical threats and impact in the smart home

R Heartfield, G Loukas, S Budimir, A Bezemskij… - Computers & …, 2018 - Elsevier
In the past, home automation was a small market for technology enthusiasts.
Interconnectivity between devices was down to the owner's technical skills and creativity …

[PDF][PDF] Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments

O Brun, Y Yin, E Gelenbe, YM Kadioglu… - Security in Computer …, 2018 - library.oapen.org
In this paper, we analyze the network attacks that can be launched against IoT gateways,
identify the relevant metrics to detect them, and explain how they can be computed from …

A survey of public IoT datasets for network security research

F De Keersmaeker, Y Cao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Publicly available datasets are an indispensable tool for researchers, as they allow testing
new algorithms on a wide range of different scenarios and making scientific experiments …

Boost‐Defence for resilient IoT networks: A head‐to‐toe approach

Q Abu Al‐Haija, A Al Badawi, GR Bojja - Expert Systems, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) is an emerging technology that is considered a key
enabler for next‐generation smart cities, industries, security services and economies. IoT …

A blockchain solution for enhancing cybersecurity defence of IoT

KM Giannoutakis, G Spathoulas… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
The growth of IoT devices during the last decade has led to the development of smart
ecosystems, such as smart homes, prone to cyberattacks. Traditional security methodologies …

Teaching and learning iot cybersecurity and vulnerability assessment with shodan through practical use cases

TM Fernández-Caramés, P Fraga-Lamas - Sensors, 2020 - mdpi.com
Shodan is a search engine for exploring the Internet and thus finding connected devices. Its
main use is to provide a tool for cybersecurity researchers and developers to detect …

Intuitive development to examine collaborative iot supply chain system underlying privacy and security levels and perspective powering through proactive blockchain

A Shahzad, K Zhang, A Gherbi - Sensors, 2020 - mdpi.com
Undoubtedly, the supply chain management (SCM) system is an important part of many
organizations worldwide; over time, the technologies used to manage a supply chain …

[PDF][PDF] Using blockchains to strengthen the security of internet of things

CS Kouzinopoulos, G Spathoulas… - Security in Computer …, 2018 - library.oapen.org
Blockchain is a distributed ledger technology that became popular as the foundational block
of the Bitcoin cryptocurrency. Over the past few years it has seen a rapid growth, both in …

Combining statistical and machine learning techniques in IoT anomaly detection for smart homes

G Spanos, KM Giannoutakis, K Votis… - 2019 IEEE 24th …, 2019 - ieeexplore.ieee.org
In this paper, a security solution is proposed for IoT smart homes based on constructing
behavioral device templates. These templates are being calculated by combining statistical …