A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities

K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …

A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

Microservices: How to make your application scale

N Dragoni, I Lanese, ST Larsen, M Mazzara… - Perspectives of System …, 2018 - Springer
The microservice architecture is a style inspired by service-oriented computing that has
recently started gaining popularity and that promises to change the way in which software is …

DDoS‐capable IoT malwares: comparative analysis and Mirai investigation

M De Donno, N Dragoni, A Giaretta… - Security and …, 2018 - Wiley Online Library
The Internet of Things (IoT) revolution has not only carried the astonishing promise to
interconnect a whole generation of traditionally “dumb” devices, but also brought to the …

Mitigating loT device based DDoS attacks using blockchain

U Javaid, AK Siang, MN Aman, B Sikdar - Proceedings of the 1st …, 2018 - dl.acm.org
Many IoT devices lack memory and computational complexities of modern computing
devices, making them vulnerable to a wide range of cyber attacks. Among these, DDoS …

A trust-based model for secure routing against RPL attacks in internet of things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …

Trust and mobility-based protocol for secure routing in Internet of Things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy
Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …

Towards the internet of robotic things: Analysis, architecture, components and challenges

I Afanasyev, M Mazzara, S Chakraborty… - … on Developments in …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) and Robotics cannot be considered two separate domains these
days. The Internet of Robotics Things (IoRT) is a concept that has been recently introduced …

Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets

G Spathoulas, N Giachoudis, GP Damiris… - Future Internet, 2019 - mdpi.com
Internet of Things is one of the most significant latest developments in computer science. It is
common for modern computing infrastructures to partially consist of numerous low power …

The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives

B Vignau, R Khoury, S Hallé, A Hamou-Lhadj - Journal of Systems …, 2021 - Elsevier
The past decade has seen a rapidly growing interest in IoT-connected devices. But as is
usually the case with computer systems and networks, malicious individuals soon realized …