The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - Computers & …, 2022 - Elsevier
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …

The Internet of Things: Review and theoretical framework

JH Nord, A Koohang, J Paliszkiewicz - Expert Systems with Applications, 2019 - Elsevier
Abstract The Internet of Things (IoT) global arena is massive and growing exponentially.
Those in the emerging digital world have recently witnessed the proliferation and impact of …

Internet of things security: A top-down survey

DE Kouicem, A Bouabdallah, H Lakhlef - Computer Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) is one of the promising technologies that has attracted a lot
of attention in both industrial and academic fields these years. It aims to integrate seamlessly …

[HTML][HTML] Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications

N Abosata, S Al-Rubaye, G Inalhan, C Emmanouilidis - Sensors, 2021 - mdpi.com
The growth of the Internet of Things (IoT) offers numerous opportunities for developing
industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising …

Security and privacy in the internet of things

C Maple - Journal of cyber policy, 2017 - Taylor & Francis
The internet of things (IoT) is a technology that has the capacity to revolutionise the way that
we live, in sectors ranging from transport to health, from entertainment to our interactions …

Continuous patient monitoring with a patient centric agent: A block architecture

MA Uddin, A Stranieri, I Gondal… - IEEE Access, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) has facilitated services without human intervention for a wide
range of applications, including continuous remote patient monitoring (RPM). However, the …

Trade-offs between distributed ledger technology characteristics

N Kannengießer, S Lins, T Dehling… - ACM Computing Surveys …, 2020 - dl.acm.org
When developing peer-to-peer applications on distributed ledger technology (DLT), a crucial
decision is the selection of a suitable DLT design (eg, Ethereum), because it is hard to …

Unlocking value from machines: business models and the industrial internet of things

M Ehret, J Wirtz - Journal of Marketing Management, 2017 - Taylor & Francis
In this article, we argue that the Industrial Internet of Things (IIoT) offers new opportunities
and harbours threats that companies are not able to address with existing business models …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …

Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach

H Bostani, M Sheikhan - Computer Communications, 2017 - Elsevier
Abstract Internet of Things (IoT) is a novel paradigm in computer networks in which resource-
constrained objects connect to unreliable Internet by using a wide range of technologies …