Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

Current research on Internet of Things (IoT) security: A survey

WH Hassan - Computer networks, 2019 - Elsevier
The results of IoT failures can be severe, therefore, the study and research in security issues
in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy …

IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …

An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things

N Moustafa, B Turnbull… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) plays an increasingly significant role in our daily activities,
connecting physical objects around us into digital services. In other words, IoT is the driving …

Survey on smart homes: Vulnerabilities, risks, and countermeasures

B Hammi, S Zeadally, R Khatoun, J Nebhen - Computers & Security, 2022 - Elsevier
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized
the way we live and interact with each other as well as with various types of systems and …

Semi-supervised learning based distributed attack detection framework for IoT

S Rathore, JH Park - Applied Soft Computing, 2018 - Elsevier
Alongside the development of Internet of Things (IoT), security attacks are also increasing
day by day. A number of centralized attack detection mechanisms have been proposed to …

A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks

HH Pajouh, R Javidan, R Khayami… - … on Emerging Topics …, 2016 - ieeexplore.ieee.org
With increasing reliance on Internet of Things (IoT) devices and services, the capability to
detect intrusions and malicious activities within IoT networks is critical for resilience of the …

A survey on technologies and security protocols: Reference for future generation IoT

R Yugha, S Chithra - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract Internet of Things (IoT) is the recent and growing which is inevitable in day-to-day
activities in current life. IoT is the network of systems which interconnect various real world …

Smart choice for the smart grid: Narrowband Internet of Things (NB-IoT)

Y Li, X Cheng, Y Cao, D Wang… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
The low power wide area network (LPWAN) technologies, which is now embracing a
booming era with the development in the Internet of Things (IoT), may offer a brand new …

Security in IoMT communications: A survey

D Koutras, G Stergiopoulos, T Dasaklis… - Sensors, 2020 - mdpi.com
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in
order to support real-time, remote patient monitoring and treatment. However, the …