Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review

M Nuaimi, LC Fourati, BB Hamed - Journal of Network and Computer …, 2023 - Elsevier
Recently years, we have seen the exponential upgrowth of the Industrial Internet of Things
(IIoT), which brings significant benefits to our daily lives, industry, and society. The common …

[HTML][HTML] Secure blockchain middleware for decentralized iiot towards industry 5.0: A review of architecture, enablers, challenges, and directions

J Leng, Z Chen, Z Huang, X Zhu, H Su, Z Lin, D Zhang - Machines, 2022 - mdpi.com
Resilient manufacturing is a vision in the Industry 5.0 blueprint for satisfying sustainable
development goals under pandemics or the rising individualized product needs. A resilient …

[HTML][HTML] An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems

S Selvarajan, G Srivastava, AO Khadidos… - Journal of Cloud …, 2023 - Springer
Abstract The Industrial Internet of Things (IIoT) promises to deliver innovative business
models across multiple domains by providing ubiquitous connectivity, intelligent data …

[HTML][HTML] Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence

T Saba, A Rehman, K Haseeb, T Alam, G Jeon - Cluster Computing, 2023 - Springer
Rapid development of the Internet of Everything (IoE) and cloud services offer a vital role in
the growth of smart applications. It provides scalability with the collaboration of cloud servers …

A lightweight specific emitter identification model for IIoT devices based on adaptive broad learning

Z Xu, G Han, L Liu, H Zhu, J Peng - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Specific emitter identification (SEI) is a technology that extracts subtle features from signals
sent by emitters to identify different individuals. It can effectively improve the security of the …

[PDF][PDF] Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment

AM Albalawi, MA Almaiah - J. Theor. Appl. Inf. Technol, 2022 - researchgate.net
ABSTRACT Despite Internet of Things (IoT) technology has a great potential to connect
devices and sensors through communication media, such as Wi-Fi, to the internet and …

[HTML][HTML] A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare

M Hosseinzadeh, J Yoo, S Ali, J Lansky, S Mildeova… - Scientific Reports, 2023 - nature.com
Abstract The Internet of Things (IoT) is a universal network to supervise the physical world
through sensors installed on different devices. The network can improve many areas …

Intrusion detection for Industrial Internet of Things based on deep learning

Y Lu, S Chai, Y Suo, F Yao, C Zhang - Neurocomputing, 2024 - Elsevier
Intrusion detection technology can actively detect abnormal behaviors in the network and is
important to the security of Industrial Internet of Things (IIOT). However, there are some …

[HTML][HTML] A cluster-tree-based secure routing protocol using dragonfly algorithm (DA) in the Internet of Things (IoT) for smart agriculture

M Hosseinzadeh, J Tanveer, A Masoud Rahmani… - Mathematics, 2022 - mdpi.com
The Internet of Things defines a global and comprehensive network whose task is to monitor
and control the physical world by collecting, processing, and analyzing data sensed by IoT …

Securing IOT devices against emerging security threats: Challenges and mitigation techniques

M Aziz Al Kabir, W Elmedany… - Journal of Cyber Security …, 2023 - Taylor & Francis
The increasing prevalence of IoT devices has brought about numerous security challenges
due to their relatively simple internal architecture and low-powered hardware warranted by …