Optimal witnessing of healthcare IoT data using blockchain logging contract

MH Chinaei, HH Gharakheili… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Verification of data generated by wearable sensors is increasingly becoming of concern to
health service providers and insurance companies. These devices are typically vulnerable …

[HTML][HTML] A systematic review of data-driven attack detection trends in IoT

S Haque, F El-Moussa, N Komninos, R Muttukrishnan - Sensors, 2023 - mdpi.com
The Internet of Things is perhaps a concept that the world cannot be imagined without today,
having become intertwined in our everyday lives in the domestic, corporate and industrial …

[HTML][HTML] Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions

E Alalwany, I Mahgoub - Sensors, 2024 - mdpi.com
The Internet of Vehicles (IoV) is a technology that is connected to the public internet and is a
subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a …

[HTML][HTML] Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets

G Spathoulas, N Giachoudis, GP Damiris… - Future Internet, 2019 - mdpi.com
Internet of Things is one of the most significant latest developments in computer science. It is
common for modern computing infrastructures to partially consist of numerous low power …

Edge device identification based on federated learning and network traffic feature engineering

Z He, J Yin, Y Wang, G Gui, B Adebisi… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
With the ubiquitous deployment and applications of Internet of Things (IoT), security issues
pose a critical challenge to IoT devices. External attackers often utilize vulnerable IoT …

[PDF][PDF] Machine learning based attacks detection and countermeasures in IoT

R Zagrouba, R Alhajri - International Journal of Communication …, 2021 - core.ac.uk
While the IoT offers important benefits and opportunities for users, the technology raises
various security issues and threats. These threats may include spreading IoT botnets …

Internet of people enabled framework for evaluating performance loss and resilience of urban critical infrastructures

F Yuan, R Liu, L Mao, M Li - Safety science, 2021 - Elsevier
Critical infrastructures (CIs) such as road networks play a critical role in transporting affected
people to hospitals and shelters during disasters. Timely evaluation of road networks' …

[HTML][HTML] A survey on the security of low power wide area networks: Threats, challenges, and potential solutions

KO Adefemi Alimi, K Ouahada, AM Abu-Mahfouz… - Sensors, 2020 - mdpi.com
Low power wide area network (LPWAN) is among the fastest growing networks in Internet of
Things (IoT) technologies. Owing to varieties of outstanding features which include long …

Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research

S Aldhaheri, D Alghazzawi, L Cheng, A Barnawi… - Journal of Network and …, 2020 - Elsevier
Abstract As the Internet of Things (IoT) recently attains tremendous popularity, this promising
technology leads to a variety of security challenges. The traditional solutions do not fit the …

Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design

JBF Sequeiros, FT Chimuco, MG Samaila… - ACM Computing …, 2020 - dl.acm.org
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …