A survey of intrusion detection in Internet of Things
BB Zarpelão, RS Miani, CT Kawakani… - Journal of Network and …, 2017 - Elsevier
Abstract Internet of Things (IoT) is a new paradigm that integrates the Internet and physical
objects belonging to different domains such as home automation, industrial process, human …
objects belonging to different domains such as home automation, industrial process, human …
[HTML][HTML] A survey of security architectures for edge computing-based IoT
E Fazeldehkordi, TM Grønli - IoT, 2022 - mdpi.com
The Internet of Things (IoT) is an innovative scheme providing massive applications that
have become part of our daily lives. The number of IoT and connected devices are growing …
have become part of our daily lives. The number of IoT and connected devices are growing …
A comprehensive study of security of internet-of-things
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …
transformative approach for providing numerous services. Compact smart devices constitute …
Deep learning in IoT intrusion detection
Abstract The Internet of Things (IoT) is the new paradigm of our times, where smart devices
and sensors from across the globe are interconnected in a global grid, and distributed …
and sensors from across the globe are interconnected in a global grid, and distributed …
SVELTE: Real-time intrusion detection in the Internet of Things
Abstract In the Internet of Things (IoT), resource-constrained things are connected to the
unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are …
unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are …
Survey on secure communication protocols for the Internet of Things
KT Nguyen, M Laurent, N Oualha - Ad Hoc Networks, 2015 - Elsevier
Abstract The Internet of Things or “IoT” defines a highly interconnected network of
heterogeneous devices where all kinds of communications seem to be possible, even …
heterogeneous devices where all kinds of communications seem to be possible, even …
Routing attacks and countermeasures in the RPL-based internet of things
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol
standardized for constrained environments such as 6LoWPAN networks. Providing security …
standardized for constrained environments such as 6LoWPAN networks. Providing security …
Securing the internet of things
This paper presents security of Internet of things. In the Internet of Things vision, every
physical object has a virtual component that can produce and consume services Such …
physical object has a virtual component that can produce and consume services Such …
Denial-of-Service detection in 6LoWPAN based Internet of Things
Smart objects connected to the Internet, constituting the so called Internet of Things (IoT), are
revolutionizing human beings' interaction with the world. As technology reaches …
revolutionizing human beings' interaction with the world. As technology reaches …
Iot-oas: An oauth-based authorization service architecture for secure services in iot scenarios
Open authorization (OAuth) is an open protocol, which allows secure authorization in a
simple and standardized way from third-party applications accessing online services, based …
simple and standardized way from third-party applications accessing online services, based …