Internet of things for smart cities: Challenges, security and privacy issues

S Manickam, A Kooy - Security and Privacy Issues (October 17 …, 2020 - papers.ssrn.com
Technology has vastly advanced over the years and brought on the birth of new innovations.
With the advancement of the Internet of Things (IoT), developing countries all over the world …

[PDF][PDF] IoT based smart systems using machine learning (ML) and artificial intelligence (AI): vulnerabilities and intelligent solutions

S Ahmed, M Ilyas, MYA Raja - no. Icsit, 2022 - iiis.org
ABSTRACT Internet of Things (IoT) has assumed great importance in technical and social
domains due to desire of smart living and intelligent solutions for industrial operations, home …

Cyber Security Risk Assessment Methods for Smart Healthcare

S Memon, S Memon, L Das… - 2024 IEEE 1st Karachi …, 2024 - ieeexplore.ieee.org
Cyber security is essential for healthcare organizations in an ICT environment. They must
protect electronic health records (HER) systems, e-prescribing systems, practice …

A Survey of Analysis Methods for Security and Safety verification in IoT Systems

L Abuserrieh, MH Alalfi - arXiv preprint arXiv:2203.01464, 2022 - arxiv.org
Internet of Things (IoT) has been rapidly growing in the past few years in all life disciplines.
IoT provides automation and smart control to its users in different domains such as home …

A Short Survey of Authentication Protocols in context of Internet of Things

M Samal, S Ray, M Dasgupta - 2023 IEEE 7th Conference on …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a modern computing model which refers to the interconnection
of physical devices or IoT devices containing actuators, sensors, and networks, enabling …

Securing data using audio steganography for the internet of things

A Gera, V Vyas - EAI Endorsed Transactions on Smart Cities, 2023 - eudl.eu
Abstract The Internet of Things (IoT) is prevalent in today's world and is part of our everyday
life. While the residential district gains in several respects, numerous problems are …

Anomaly Detection Collaborating Adaptive CEEMDAN Feature Exploitation with Intelligent Optimizing Classification for IIoT Sparse Data

J Zhao, P Zeng, M Wan, X Xu, J Li… - … and Mobile Computing, 2021 - Wiley Online Library
IIoT (Industrial Internet of Things) has gained considerable attention and has been
increasingly applied due to its ubiquitous sensing and communication. However, the sparse …

Managing Information Security Risks in the Age of IoT.

AZ Abualkishik, R Almajed - Journal of Cybersecurity & …, 2023 - search.ebscohost.com
The advent of the Internet of Things (IoT) has led to the proliferation of connected devices,
creating numerous security challenges. With billions of devices generating vast amounts of …

Selective Sub-DODAGs Hiding" SSDH" a new Attack in IoT RPL-Based Networks

SAH Belkhira, M Rouissat, M Belkheir… - Turkish Journal of …, 2022 - turcomat.org
The security concern in RPL-based IoT networks has gained a close attention by the
researchers in the recent past years. This is due to the inherent constraints of nodes and the …

Machine Learning Techniques for Detecting and Mitigating DDoS Attacks in IoT

M Gupta, R Ahuja, K Sharma, F Ahmed… - … in Engineering and …, 2023 - ieeexplore.ieee.org
In today's developing world, all devices are becoming smarter and communicate with other
devices. Recent innovations in technology and increased use of IoT systems has led to …