Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

Towards the development of a realistic multidimensional IoT profiling dataset

S Dadkhah, H Mahdikhani, PK Danso… - 2022 19th Annual …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology that enables the development of low-
cost and energy-efficient IoT devices across various solutions from smart cities to healthcare …

Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks

Y Guan, X Ge - IEEE Transactions on Signal and Information …, 2017 - ieeexplore.ieee.org
This paper is concerned with the problem of joint distributed attack detection and distributed
secure estimation for a networked cyber-physical system under physical and cyber attacks …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

[PDF][PDF] Security and privacy threats in IoT architectures.

D Kozlov, J Veijalainen, Y Ali - BODYNETS, 2012 - researchgate.net
In this paper, we describe an overall architecture for Internet of Things (IoT) and analyze the
known and new threats for the security, privacy and trust (SPT) at different levels of …

Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks

F Al-Turjman, YK Ever, E Ever, HX Nguyen… - IEEE …, 2017 - ieeexplore.ieee.org
Recently, the Internet of Things (IoT) has emerged as a significant advancement for Internet
and mobile networks with various public safety network applications. An important use of IoT …

A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks

W Zhang, S Zhu, J Tang, N Xiong - The Journal of Supercomputing, 2018 - Springer
With the development of Internet technology, social network has become an important
application in the network life. However, due to the rapid increase in the number of users …

Detecting node replication attacks in wireless sensor networks: a survey

WT Zhu, J Zhou, RH Deng, F Bao - Journal of Network and Computer …, 2012 - Elsevier
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-
constrained sensor nodes, but is often deployed in unattended and harsh environments to …

Simulation of attacks for security in wireless sensor network

A Diaz, P Sanchez - Sensors, 2016 - mdpi.com
The increasing complexity and low-power constraints of current Wireless Sensor Networks
(WSN) require efficient methodologies for network simulation and embedded software …