Current research on Internet of Things (IoT) security: A survey

WH Hassan - Computer networks, 2019 - Elsevier
The results of IoT failures can be severe, therefore, the study and research in security issues
in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy …

Internet of Things security: A survey

FA Alaba, M Othman, IAT Hashem, F Alotaibi - Journal of Network and …, 2017 - Elsevier
Abstract The Internet of things (IoT) has recently become an important research topic
because it integrates various sensors and objects to communicate directly with one another …

An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols

BB Gupta, M Quamara - Concurrency and Computation …, 2020 - Wiley Online Library
Understanding of any computing environment requires familiarity with its underlying
technologies. Internet of Things (IoT), being a new era of computing in the digital world, aims …

Role of machine learning and deep learning in securing 5G-driven industrial IoT applications

P Sharma, S Jain, S Gupta, V Chamola - Ad Hoc Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) connects millions of computing devices and has set a
stage for future technology where industrial use cases like smart cities and smart houses will …

A survey on technologies and security protocols: Reference for future generation IoT

R Yugha, S Chithra - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract Internet of Things (IoT) is the recent and growing which is inevitable in day-to-day
activities in current life. IoT is the network of systems which interconnect various real world …

Cooperative jamming for physical layer security enhancement in Internet of Things

L Hu, H Wen, B Wu, F Pan, RF Liao… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is becoming an emerging paradigm to achieve ubiquitous
connectivity, via massive deployment of physical objects, such as sensors, controllers, and …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

A novel statistical technique for intrusion detection systems

E Kabir, J Hu, H Wang, G Zhuo - Future Generation Computer Systems, 2018 - Elsevier
This paper proposes a novel approach for intrusion detection system based on sampling
with Least Square Support Vector Machine (LS-SVM). Decision making is performed in two …

Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations

Q Xu, P Ren, H Song, Q Du - IEEE Access, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) depicts a bright future, where any devices having sensorial and
computing capabilities can interact with each other. Among all existing technologies, the …

Hashed Needham Schroeder industrial IoT based cost optimized deep secured data transmission in cloud

JA Alzubi, R Manikandan, OA Alzubi, I Qiqieh, R Rahim… - Measurement, 2020 - Elsevier
Deep learning is an encouraging approach for extracting precise information from raw
sensor data from IoT devices. In this paper, Hashed Needham Schroeder (HNS) Cost …