Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

Understanding security requirements and challenges in Internet of Things (IoT): A review

S Hameed, FI Khan, B Hameed - Journal of Computer Networks …, 2019 - Wiley Online Library
Internet of things (IoT) is realized by the idea of free flow of information amongst various low‐
power embedded devices that use the Internet to communicate with one another. It is …

Security and privacy in the internet of things

C Maple - Journal of cyber policy, 2017 - Taylor & Francis
The internet of things (IoT) is a technology that has the capacity to revolutionise the way that
we live, in sectors ranging from transport to health, from entertainment to our interactions …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

Securing the internet of things: A standardization perspective

SL Keoh, SS Kumar… - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
The Internet of Things (IoT) is the next wave of innovation that promises to improve and
optimize our daily life based on intelligent sensors and smart objects working together …

[HTML][HTML] Network optimizations in the Internet of Things: A review

NN Srinidhi, SMD Kumar, KR Venugopal - Engineering Science and …, 2019 - Elsevier
The Internet was initially used to transfer data packets between users and data sources with
a specific IP address. Due to advancements, the Internet is being used to share data among …

The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

Toward the internet of underground things: A systematic survey

N Saeed, MS Alouini… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
This paper provides recent advances in the area of Internet of Underground Things (IoUT)
with emphasis on enabling communication technologies, networking issues, and …

A decentralized approach for security and privacy challenges in the internet of things

AF Skarmeta, JL Hernandez-Ramos… - 2014 IEEE world …, 2014 - ieeexplore.ieee.org
The strong development of the Internet of Things (IoT) is dramatically changing traditional
perceptions of the current Internet towards an integrated vision of smart objects interacting …

Delegation-based authentication and authorization for the IP-based Internet of Things

R Hummen, H Shafagh, S Raza, T Voig… - 2014 eleventh annual …, 2014 - ieeexplore.ieee.org
IP technology for resource-constrained devices enables transparent end-to-end connections
between a vast variety of devices and services in the Internet of Things (IoT). To protect …