Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

Internet of things: Evolution, concerns and security challenges

P Malhotra, Y Singh, P Anand, DK Bangotra, PK Singh… - Sensors, 2021 - mdpi.com
The escalated growth of the Internet of Things (IoT) has started to reform and reshape our
lives. The deployment of a large number of objects adhered to the internet has unlocked the …

Towards blockchain-based auditable storage and sharing of IoT data

H Shafagh, L Burkhalter, A Hithnawi… - Proceedings of the 2017 …, 2017 - dl.acm.org
Today the cloud plays a central role in storing, processing, and distributing data. Despite
contributing to the rapid development of IoT applications, the current IoT cloud-centric …

Waldo: A private time-series database from function secret sharing

E Dauterman, M Rathee, RA Popa… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Applications today rely on cloud databases for storing and querying time-series data. While
outsourcing storage is convenient, this data is often sensitive, making data breaches a …

Blockchain mechanism and symmetric encryption in a wireless sensor network

AE Guerrero-Sanchez, EA Rivas-Araiza… - Sensors, 2020 - mdpi.com
The Internet of Things (IoT) paradigm allows the connection and exchange of information
between millions of smart devices. This paradigm grows and develops exponentially as do …

CryptDICE: Distributed data protection system for secure cloud data storage and computation

A Rafique, D Van Landuyt, EH Beni, B Lagaisse… - Information Systems, 2021 - Elsevier
Cloud storage allows organizations to store data at remote sites of service providers.
Although cloud storage services offer numerous benefits, they also involve new risks and …

Secure sharing of partially homomorphic encrypted IoT data

H Shafagh, A Hithnawi, L Burkhalter, P Fischli… - Proceedings of the 15th …, 2017 - dl.acm.org
IoT applications often utilize the cloud to store and provide ubiquitous access to collected
data. This naturally facilitates data sharing with third-party services and other users, but …

Lightweight, Secure, Similar-Document Retrieval over Encrypted Data

MA Al Sibahee, AI Abdulsada, ZA Abduljabbar, J Ma… - Applied Sciences, 2021 - mdpi.com
Applications for document similarity detection are widespread in diverse communities,
including institutions and corporations. However, currently available detection systems fail to …

{TVA}: A multi-party computation system for secure and expressive time series analytics

M Faisal, J Zhang, J Liagouris, V Kalavri… - 32nd USENIX Security …, 2023 - usenix.org
We present TVA, a multi-party computation (MPC) system for secure analytics on secret-
shared time series data. TVA achieves strong security guarantees in the semi-honest and …