Security and privacy for low power iot devices on 5g and beyond networks: Challenges and future directions

J Cook, SU Rehman, MA Khan - IEEE Access, 2023 - ieeexplore.ieee.org
The growth in the use of small sensor devices, commonly known as the Internet of Things
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …

Assimilation of 3D printing, Artificial Intelligence (AI) and Internet of Things (IoT) for the construction of eco-friendly intelligent homes: An explorative review

BS Alotaibi, AI Shema, AU Ibrahim, MA Abuhussain… - Heliyon, 2024 - cell.com
The construction industry is witnessing a transformative shift towards sustainable and
intelligent housing solutions driven by advancements in 3D printing, Artificial Intelligence …

Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach

J Ren, DJ Dubois, D Choffnes, AM Mandalari… - Proceedings of the …, 2019 - dl.acm.org
Internet of Things (IoT) devices are increasingly found in everyday homes, providing useful
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …

Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography

VO Nyangaresi - Journal of Systems Architecture, 2022 - Elsevier
The communication channel between the smart home devices and the remote users is
susceptible to numerous privacy and security compromise attacks. To address these issues …

[HTML][HTML] Using data mining techniques to explore security issues in smart living environments in Twitter

JR Saura, D Palacios-Marqués… - Computer …, 2021 - Elsevier
In present-day in consumers' homes, there are millions of Internet-connected devices that
are known to jointly represent the Internet of Things (IoT). The development of the IoT …

Vulnerability studies and security postures of IoT devices: A smart home case study

BD Davis, JC Mason, M Anwar - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) technology has revolutionized our daily lives in many ways-whether
it is the way we conduct our day-to-day activities inside our home, or the way we control our …

Lightweight three-factor-based privacy-preserving authentication scheme for iot-enabled smart homes

S Yu, N Jho, Y Park - IEEE Access, 2021 - ieeexplore.ieee.org
Smart homes are an emerging paradigm of Internet of Things (IoT) in which users can
remotely control various home devices via the internet anytime and anywhere. However …

A security protocol for route optimization in DMM-based smart home IoT networks

D Shin, K Yun, J Kim, PV Astillo, JN Kim, I You - IEEE Access, 2019 - ieeexplore.ieee.org
Smart home networks have been recognized as one of its representative important
applications in the forthcoming 5G era. It is also expected that in 5G networks, future smart …

Are you spying on me?{Large-Scale} analysis on {IoT} data exposure through companion apps

Y Nan, X Wang, L Xing, X Liao, R Wu, J Wu… - 32nd USENIX Security …, 2023 - usenix.org
Recent research has highlighted privacy as a primary concern for IoT device users.
However, due to the challenges in conducting a large-scale study to analyze thousands of …

Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems

F Mathis, K Vaniea, M Khamis - Proceedings of the 2021 chi conference …, 2021 - dl.acm.org
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …