A Detailed Review of the IoT with Detection of Sinkhole Attacks in RPL based network

J Rani, A Dhingra, V Sindhu - 2022 International conference on …, 2022 - ieeexplore.ieee.org
The “Internet of Things”(IoT) is internetworking of physical devices known as' things',
algorithms, equipment and techniques that allow communication with another device …

Towards behavioral profiling based anomaly detection for smart homes

M Dilraj, K Nimmy, S Sankaran - TENCON 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
Embedded devices in smart homes have become increasingly vulnerable to numerous
security and privacy threats. Over the past few years, devices such as Smart Cameras have …

Intelligent energy meter with home automation

RT Mathew, S Thattat, KV Anirudh… - … for Convergence in …, 2018 - ieeexplore.ieee.org
While electricity authorities are trying to meet the power demand on one side, much of
energy is getting wasted on other end. At some points in a day, especially during peak …

A cybersecurity guide for using fitness devices

M Bada, B von Solms - The Fifth International Conference on Safety and …, 2022 - Springer
The popularity of wearable devices is growing exponentially, with consumers using these for
a variety of services. Fitness devices are currently offering new services such as shopping or …

A tool to extract onion links from Tor hidden services and identify illegal activities

V Nair, JM Kannimoola - Inventive Computation and Information …, 2022 - Springer
The dark web is a covered segment of the Internet that provides privacy-protected network
access. Tor is a volunteer run prominent dark web network that becomes heaven for …

A formal modeling approach for QoS in MQTT protocol

E Archana, A Rajeev, A Kuruvila… - … Proceedings of GUCON …, 2020 - Springer
With the rising demand for IoT devices, communication protocols like MQTT, CoAP, and
many more, have become an integral part of the system to ensure safe and reliable data …

Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology

M Savithri, M Pradeepa, DR Prasad… - Wireless …, 2023 - Wiley Online Library
In general, the malicious hackers can infiltrate tens of thousands or millions of insecure
computers, disable infrastructure, shut down networks, and access personal information …

Intelligent Vehicle Collision Detection and Traffic Control

S Sneha, K Deepa, M Nithya - 2022 International Conference …, 2022 - ieeexplore.ieee.org
The rate of road accidents is increasing day by day. People engaged in traffic accidents may
suffer physical, mental, and financial consequences. It can also create impact on people …

[PDF][PDF] IoT Privacy in 5G Networks.

E Catania, A La Corte - IoTBDS, 2018 - iris.unict.it
In the Internet of Things (IoT), objects, equipped with sensing, processing, storage and
decision-making capabilities, actively interact with one another and with humans. Even if …

Study of hardware attacks on smart system design lab

N Ramasubramanian, J Kokila - Security of internet of things …, 2021 - api.taylorfrancis.com
This chapter illustrates elaborately the use of technology to design a hardware platform to
handle IoT edge-computing requirements to secure against physical attacks, along with …