A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches
SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …
exchange data. These “things” can be sensors, actuators, smartphones, wearables …
Microservices: How to make your application scale
The microservice architecture is a style inspired by service-oriented computing that has
recently started gaining popularity and that promises to change the way in which software is …
recently started gaining popularity and that promises to change the way in which software is …
DDoS‐capable IoT malwares: comparative analysis and Mirai investigation
The Internet of Things (IoT) revolution has not only carried the astonishing promise to
interconnect a whole generation of traditionally “dumb” devices, but also brought to the …
interconnect a whole generation of traditionally “dumb” devices, but also brought to the …
Mitigating loT device based DDoS attacks using blockchain
Many IoT devices lack memory and computational complexities of modern computing
devices, making them vulnerable to a wide range of cyber attacks. Among these, DDoS …
devices, making them vulnerable to a wide range of cyber attacks. Among these, DDoS …
A trust-based model for secure routing against RPL attacks in internet of things
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …
Trust and mobility-based protocol for secure routing in Internet of Things
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy
Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …
Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …
Towards the internet of robotic things: Analysis, architecture, components and challenges
The Internet of Things (IoT) and Robotics cannot be considered two separate domains these
days. The Internet of Robotics Things (IoRT) is a concept that has been recently introduced …
days. The Internet of Robotics Things (IoRT) is a concept that has been recently introduced …
Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets
G Spathoulas, N Giachoudis, GP Damiris… - Future Internet, 2019 - mdpi.com
Internet of Things is one of the most significant latest developments in computer science. It is
common for modern computing infrastructures to partially consist of numerous low power …
common for modern computing infrastructures to partially consist of numerous low power …
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives
The past decade has seen a rapidly growing interest in IoT-connected devices. But as is
usually the case with computer systems and networks, malicious individuals soon realized …
usually the case with computer systems and networks, malicious individuals soon realized …