The internet of things security: A survey encompassing unexplored areas and new insights
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …
life undertakings, mandates continuous research pursuits in IoT and its associated …
Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
DÏoT: A federated self-learning anomaly detection system for IoT
IoT devices are increasingly deployed in daily life. Many of these devices are, however,
vulnerable due to insecure design, implementation, and configuration. As a result, many …
vulnerable due to insecure design, implementation, and configuration. As a result, many …
IoT survey: An SDN and fog computing perspective
Recently, there has been an increasing interest in the Internet of Things (IoT). While some
analysts disvalue the IoT hype, several technology leaders, governments, and researchers …
analysts disvalue the IoT hype, several technology leaders, governments, and researchers …
A review on the security of the internet of things: Challenges and solutions
Abstract The Internet of Things (IoT) has emerged as a modern wave of Internet
technologies that promises great transformation of life in areas such as smart health, smart …
technologies that promises great transformation of life in areas such as smart health, smart …
HomeSnitch: Behavior transparency and control for smart home IoT devices
The widespread adoption of smart home IoT devices has led to a broad and heterogeneous
market with flawed security designs and privacy concerns. While the quality of IoT device …
market with flawed security designs and privacy concerns. While the quality of IoT device …
A review in recent development of network threats and security measures
Networks are vulnerable devices due to their basic feature of facilitating remote access and
data communication. The information in the networks needs to be kept secured and safe in …
data communication. The information in the networks needs to be kept secured and safe in …
Smart contract based policies for the Internet of Things
V Puri, I Priyadarshini, R Kumar, C Van Le - Cluster Computing, 2021 - Springer
Abstract Internet of Things (IoT) is one of the most powerful platforms that incorporates
several other technological components within itself. The IoT ecosystem comprises devices …
several other technological components within itself. The IoT ecosystem comprises devices …
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things
TJ OConnor, W Enck, B Reaves - … of the 12th Conference on Security …, 2019 - dl.acm.org
The always-on, always-connected nature of smart home devices complicates Internet-of-
Things (IoT) security and privacy. Unlike traditional hosts, IoT devices constantly send …
Things (IoT) security and privacy. Unlike traditional hosts, IoT devices constantly send …
Vigilia: Securing smart home edge computing
Smart home IoT devices are becoming increasingly popular. Modern programmable smart
home hubs such as SmartThings enable homeowners to manage devices in sophisticated …
home hubs such as SmartThings enable homeowners to manage devices in sophisticated …