State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions

RR Krishna, A Priyadarshini, AV Jha, B Appasani… - Sustainability, 2021 - mdpi.com
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects
that are embedded with sensors, software, and other technologies intending to connect and …

Intrusion detection systems: A cross-domain overview

LN Tidjon, M Frappier… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …

Significant permission identification for machine-learning-based android malware detection

J Li, L Sun, Q Yan, Z Li, W Srisa-An… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The alarming growth rate of malicious apps has become a serious issue that sets back the
prosperous mobile ecosystem. A recent report indicates that a new malicious app for …

A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …

Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks

S Huda, J Yearwood, MM Hassan, A Almogren - Applied soft computing, 2018 - Elsevier
Abstract Internet of Things (IoTs) platform is increasingly being used in modern industries.
Billions of devices with smart sensing capabilities, PLCs, actuators, intelligent electronic …

Nowhere to hide: Efficiently identifying probabilistic cloning attacks in large-scale RFID systems

X Ai, H Chen, K Lin, Z Wang, J Yu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Radio-Frequency Identification (RFID) is an emerging technology which has been widely
applied in various scenarios, such as tracking, object monitoring, and social networks, etc …

Physical-layer detection and security of printed chipless RFID tag for internet of things applications

G Khadka, B Ray, NC Karmakar… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article has proposed detection and physical-layer security provision for printed sensory
tag systems for Internet of Things (IoT) applications. The printed sensory tags can be a very …

NB-IoT security: A survey

V Kumar, RK Jha, S Jain - Wireless Personal Communications, 2020 - Springer
In the past few years, the term Internet of Things (IoT) has become very prevalent. In IoT,
aggregation of data (from sensors) to processing the data (to the cloud) is energy constraint …

[PDF][PDF] A survey of IoT security threats and defenses

HI Ahmed, AA Nasr, S Abdel-Mageid… - International Journal of …, 2019 - academia.edu
Abstract Internet of Things (IoT) plays a well-known role in the interconnection of the
physical and virtual objects for the purpose of exchanging information. IoT environment can …

Capture-aware identification of mobile RFID tags with unreliable channels

J Su, Z Sheng, AX Liu, Y Han… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Radio frequency identification (RFID) has been widely applied in large-scale applications
such as logistics, merchandise and transportation. However, it is still a technical challenge to …