A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT

J Sengupta, S Ruj, SD Bit - Journal of network and computer applications, 2020 - Elsevier
In recent years, the growing popularity of Internet of Things (IoT) is providing a promising
opportunity not only for the development of various home automation systems but also for …

A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security

W Iqbal, H Abbas, M Daneshmand… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …

SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT

S Sujanthi, S Nithya Kalyani - Wireless Personal Communications, 2020 - Springer
In WSN-assisted IoT, energy efficiency and security which play pivotal role in Quality of
Service (QoS) are still challenging due to its open and resource constrained nature …

An efficient public key secure scheme for cloud and IoT security

C Thirumalai, S Mohan, G Srivastava - Computer Communications, 2020 - Elsevier
Abstract According to the National Institute of Standard and Technology (NIST), the security
level of RSA is safe when it is N-bit modulus≥ 2048 bits. Because of this, the processing …

Modelling DDoS attacks in IoT networks using machine learning

P Machaka, O Ajayi, F Kahenga, A Bagula… - International Conference …, 2022 - Springer
Abstract The Internet-of-Things (IoT) relies on the TCP protocol to transport data from a
source to a destination. Making it vulnerable to DDoS using the TCP SYN attack on Cyber …

Towards a secure and scalable iot infrastructure: A pilot deployment for a smart water monitoring system

A Overmars, S Venkatraman - Technologies, 2020 - mdpi.com
Recent growth in the Internet of Things (IoT) looks promising for realizing a smart
environment of the future. However, concerns about the security of IoT devices are …

Research on security detection technology for internet of things terminal based on firmware code genes

X Zhu, Q Li, Z Chen, G Zhang, P Shan - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) terminals have firmware with heterogeneous, closed-source, and
heavy business but light security characteristics, whereas on the edge, there are limited …

Blockchain-integrated internet-of-Things architecture in privacy preserving for large-scale healthcare supply chain data

K Pal - … Technology and Computational Excellence for Society …, 2022 - igi-global.com
The supply chain forms the backbone of healthcare industry operations. The design and
development of healthcare information systems (HIS) help different types of decision-making …

FaTEMa: A framework for multi-layer fault tolerance in IoT systems

M Melo, G Aquino - Sensors, 2021 - mdpi.com
Fault tolerance in IoT systems is challenging to overcome due to its complexity, dynamicity,
and heterogeneity. IoT systems are typically designed and constructed in layers. Every layer …