A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions

W Fei, H Ohno, S Sampalli - ACM Computing Surveys, 2023 - dl.acm.org
The Internet of Things (IoT) encompasses a network of physical objects embedded with
sensors, software, and data processing technologies that can establish connections and …

PLAKE: PUF-based secure lightweight authentication and key exchange protocol for IOT

S Roy, D Das, A Mondal, MH Mahalat… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is evolving as a ubiquitous technology to thrive human lives with
minimal time and effort. The resource-constrained IoT devices operating in an ambient …

Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0

BB Gupta, A Tewari, I Cvitić, D Peraković, X Chang - Wireless networks, 2022 - Springer
In this paper, we introduce an approach to secure IoT devices from unsolicited emails by
using certain AI-based features and clustering in real-time. We propose a novel approach …

Robust and lightweight symmetric key exchange algorithm for next-generation IoE

Z Ashraf, A Sohail, M Yousaf - Internet of Things, 2023 - Elsevier
Abstract The Internet of Everything (IoE) is a multi-domain environment where millions of
people and smart devices are connected and communicate with each other. IoE demands …

Securing IOT devices against emerging security threats: Challenges and mitigation techniques

M Aziz Al Kabir, W Elmedany… - Journal of Cyber Security …, 2023 - Taylor & Francis
The increasing prevalence of IoT devices has brought about numerous security challenges
due to their relatively simple internal architecture and low-powered hardware warranted by …

Understanding security in smart city domains from the ANT-centric perspective

J Fan, W Yang, Z Liu, J Kang, D Niyato… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
A city is a large human settlement that serves the people who live there, and a smart city is a
concept of how cities might better serve their residents through new forms of technology. In …

Securing data in transit using data-in-transit defender architecture for cloud communication

K Nandakumar, V Vinod, SM Akbar Batcha, DK Sharma… - Soft Computing, 2021 - Springer
The advent of cloud infrastructure in which third-party cloud services may retain sensitive
consumer and company data in storage environments underlines the need to advocate for …

Monitoring and detection time optimization of man in the middle attacks using machine learning

O Toutsop, P Harvey, K Kornegay - 2020 IEEE Applied Imagery …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is growing with the advancement of technology. Many vendors
are creating IoT devices to leverage the quality of life of consumers. These devices include …

A review on 5G technology in IoT-application based on light fidelity (Li-Fi) indoor communication

Y Fazea, F Mohammed, A Al-Nahari - International Conference of Reliable …, 2021 - Springer
Representing a significant advancement over the 4G LTE network, 5G paves the door for the
widespread use of IoT applications. This paper explored 5G technology in IoT applications …

Blockchain for IoT-based cyber-physical systems (CPS): applications and challenges

RA Ali, ES Ali, RA Mokhtar, RA Saeed - Blockchain based internet of things, 2022 - Springer
Abstract Cyber-Physical System (CPS) enables to combine the physical objects with
computing and storage capabilities to have data exchange in an interconnected network of …