The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - Computers & …, 2022 - Elsevier
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …

Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

DÏoT: A federated self-learning anomaly detection system for IoT

TD Nguyen, S Marchal, M Miettinen… - 2019 IEEE 39th …, 2019 - ieeexplore.ieee.org
IoT devices are increasingly deployed in daily life. Many of these devices are, however,
vulnerable due to insecure design, implementation, and configuration. As a result, many …

IoT survey: An SDN and fog computing perspective

O Salman, I Elhajj, A Chehab, A Kayssi - Computer Networks, 2018 - Elsevier
Recently, there has been an increasing interest in the Internet of Things (IoT). While some
analysts disvalue the IoT hype, several technology leaders, governments, and researchers …

A review on the security of the internet of things: Challenges and solutions

OI Abiodun, EO Abiodun, M Alawida… - Wireless Personal …, 2021 - Springer
Abstract The Internet of Things (IoT) has emerged as a modern wave of Internet
technologies that promises great transformation of life in areas such as smart health, smart …

HomeSnitch: Behavior transparency and control for smart home IoT devices

TJ OConnor, R Mohamed, M Miettinen… - Proceedings of the 12th …, 2019 - dl.acm.org
The widespread adoption of smart home IoT devices has led to a broad and heterogeneous
market with flawed security designs and privacy concerns. While the quality of IoT device …

A review in recent development of network threats and security measures

R Dastres, M Soori - International Journal of Information Sciences and …, 2021 - hal.science
Networks are vulnerable devices due to their basic feature of facilitating remote access and
data communication. The information in the networks needs to be kept secured and safe in …

Smart contract based policies for the Internet of Things

V Puri, I Priyadarshini, R Kumar, C Van Le - Cluster Computing, 2021 - Springer
Abstract Internet of Things (IoT) is one of the most powerful platforms that incorporates
several other technological components within itself. The IoT ecosystem comprises devices …

Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things

TJ OConnor, W Enck, B Reaves - … of the 12th Conference on Security …, 2019 - dl.acm.org
The always-on, always-connected nature of smart home devices complicates Internet-of-
Things (IoT) security and privacy. Unlike traditional hosts, IoT devices constantly send …

Vigilia: Securing smart home edge computing

R Trimananda, A Younis, B Wang, B Xu… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Smart home IoT devices are becoming increasingly popular. Modern programmable smart
home hubs such as SmartThings enable homeowners to manage devices in sophisticated …