IoT intrusion detection taxonomy, reference architecture, and analyses

K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie - Sensors, 2021 - mdpi.com
This paper surveys the deep learning (DL) approaches for intrusion-detection systems
(IDSs) in Internet of Things (IoT) and the associated datasets toward identifying gaps …

Security and privacy requirements for the internet of things: A survey

N Alhirabi, O Rana, C Perera - ACM Transactions on Internet of Things, 2021 - dl.acm.org
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …

IoT bugs and development challenges

A Makhshari, A Mesbah - 2021 IEEE/ACM 43rd International …, 2021 - ieeexplore.ieee.org
IoT systems are rapidly adopted in various domains, from embedded systems to smart
homes. Despite their growing adoption and popularity, there has been no thorough study to …

Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes

Z Ling, H Yan, X Shao, J Luo, Y Xu, B Pearson… - Journal of Systems …, 2021 - Elsevier
With the extensive application of IoT techniques, IoT devices have become ubiquitous in
daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT …

GRAVITAS: Graphical reticulated attack vectors for Internet-of-Things aggregate security

J Brown, T Saha, NK Jha - IEEE Transactions on Emerging …, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of
devices connected in a complex network topology. The diversity and complexity of these …

The role of the Internet of Things in Healthcare in supporting clinicians and patients: A narrative review

R Lederman, O Ben-Assuli, TH Vo - Health Policy and Technology, 2021 - Elsevier
Purpose This narrative review surveys the literature on the Internet of Things (IoT) in
healthcare, organising it according to dominant trends to provide instructive examples of …

Internet of things (IoT): Vulnerabilities and remediation strategies

P Anand, Y Singh, A Selwal - … in Computing: Proceedings of ICRIC 2020, 2021 - Springer
Iot being a transformative approach for imparting countless services raises consequential
security flaws as well. These flaws germinate from the embedded vulnerabilities in IoT …

Whisper: wireless home identification and sensing platform for energy reduction

M Jacoby, SY Tan, M Katanbaf, A Saffari… - Journal of Sensor and …, 2021 - mdpi.com
Many regions of the world benefit from heating, ventilating, and air-conditioning (HVAC)
systems to provide productive, comfortable, and healthy indoor environments, which are …

Anonymizing sensor data on the edge: a representation learning and transformation approach

O Hajihassani, O Ardakanian, H Khazaei - ACM Transactions on Internet …, 2021 - dl.acm.org
The abundance of data collected by sensors in Internet of Things devices and the success of
deep neural networks in uncovering hidden patterns in time series data have led to …

Generalized reinforcement learning for building control using Behavioral Cloning

ZE Lee, KM Zhang - Applied Energy, 2021 - Elsevier
Advanced building control methods such as model predictive control (MPC) offer significant
benefits to both consumers and grid operators, but high computational requirements have …