A survey of intrusion detection in Internet of Things

BB Zarpelão, RS Miani, CT Kawakani… - Journal of Network and …, 2017 - Elsevier
Abstract Internet of Things (IoT) is a new paradigm that integrates the Internet and physical
objects belonging to different domains such as home automation, industrial process, human …

A survey of security architectures for edge computing-based IoT

E Fazeldehkordi, TM Grønli - IoT, 2022 - mdpi.com
The Internet of Things (IoT) is an innovative scheme providing massive applications that
have become part of our daily lives. The number of IoT and connected devices are growing …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

Deep learning in IoT intrusion detection

S Tsimenidis, T Lagkas, K Rantos - Journal of network and systems …, 2022 - Springer
Abstract The Internet of Things (IoT) is the new paradigm of our times, where smart devices
and sensors from across the globe are interconnected in a global grid, and distributed …

SVELTE: Real-time intrusion detection in the Internet of Things

S Raza, L Wallgren, T Voigt - Ad hoc networks, 2013 - Elsevier
Abstract In the Internet of Things (IoT), resource-constrained things are connected to the
unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are …

Survey on secure communication protocols for the Internet of Things

KT Nguyen, M Laurent, N Oualha - Ad Hoc Networks, 2015 - Elsevier
Abstract The Internet of Things or “IoT” defines a highly interconnected network of
heterogeneous devices where all kinds of communications seem to be possible, even …

Routing attacks and countermeasures in the RPL-based internet of things

L Wallgren, S Raza, T Voigt - International Journal of …, 2013 - journals.sagepub.com
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol
standardized for constrained environments such as 6LoWPAN networks. Providing security …

Securing the internet of things

R Roman, P Najera, J Lopez - Computer, 2011 - ieeexplore.ieee.org
This paper presents security of Internet of things. In the Internet of Things vision, every
physical object has a virtual component that can produce and consume services Such …

Denial-of-Service detection in 6LoWPAN based Internet of Things

P Kasinathan, C Pastrone, MA Spirito… - 2013 IEEE 9th …, 2013 - ieeexplore.ieee.org
Smart objects connected to the Internet, constituting the so called Internet of Things (IoT), are
revolutionizing human beings' interaction with the world. As technology reaches …

Iot-oas: An oauth-based authorization service architecture for secure services in iot scenarios

S Cirani, M Picone, P Gonizzi, L Veltri… - IEEE sensors …, 2014 - ieeexplore.ieee.org
Open authorization (OAuth) is an open protocol, which allows secure authorization in a
simple and standardized way from third-party applications accessing online services, based …