Comparative study of IoT forensic frameworks

H Mahmood, M Arshad, I Ahmed, S Fatima… - Forensic Science …, 2024 - Elsevier
Abstract Internet of Things (IoT) systems often consist of heterogeneous, resource-
constrained devices that generate massive amounts of data. This data is important for …

Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things

T Wang, T Tang, Z Cai, K Fang, J Tian, J Li… - ACM Transactions on …, 2024 - dl.acm.org
The Medical Internet of Things (MIoT) requires extreme information and communication
security, particularly for remote consultation systems. MIoT's integration of physical and …

Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review

R Kaur, S Shahrestani, C Ruan - Computer Networks and …, 2024 - ojs.wiserpub.com
Abstract Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare
to monitor health data. However, when WWSN users transmit their data to healthcare …

IHIBE: A Hierarchical and Delegated Access Control Mechanism for IoT Environments

H Purnama, M Mambo - Sensors, 2024 - mdpi.com
Ensuring authorized access control in the IoT is vital for privacy and safety protection. Our
study presents the novel IHIBE framework, which combines IOTA (a distributed ledger …

Requirements and Design Architecture for Digital Twin End-to-End Trustworthiness

N Bicocchi, M Fogli, C Giannelli… - IEEE Internet …, 2024 - ieeexplore.ieee.org
The wide adoption of IoT involves a previously unseen level of complexity imposing to
multiple stakeholders to deal with and trust the complex integration of applications with a …

Enhancing Supply Chain Traceability through Blockchain and IoT Integration: A Comprehensive Review

EKS Wong, HY Ting, AF Atanda - Green Intelligent Systems …, 2024 - tecnoscientifica.com
Supply chain traceability is essential for ensuring safety, preventing counterfeit goods, and
improving efficiency. The integration of blockchain technology and the Internet of Things …

Enhancing Network Security: Leveraging Isolation Forest for Malware Detection

JA Pawar, MS Avhankar, A Gupta… - … on Advancement in …, 2024 - ieeexplore.ieee.org
In this work it has been shown that the growth of computer attacks continues to advance
constantly, as well as the large number of vulnerability detection and protection tools that …

IdO, apprentissage profond et cybersécurité dans la maison connectée: une étude

M ATIEH, O MOHAMMAD, A SABRA… - Cybersécurité des …, 2024 - books.google.com
Développer la domotique repose sur un médium qui soutient la communication et la
coopération entre appareils. Pour ce faire, il faut suivre une méthode pour implémenter et …

Exploring IoT Frameworks: An In-Depth Analysis and Survey of Security Protocols

NR Chandrika, DL Arya - Available at SSRN 4746559, 2024 - papers.ssrn.com
The security issues associated with IoT applications are often not properly addressed due to
the complexity of the IoT threat landscape. One of the most critical factors that can be …

[PDF][PDF] Data Security in Internet of Things: An Empirical Investigation

S Sohaila, MA Sayedb - researchgate.net
ABSTRACT The Internet of things (IoT) has been contributing to changing our day to day
lives for over a decade. It has gained prominence in the technological sectors such as …