Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review

N Mishra, S Pandya - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) technology is prospering and entering every part of our lives, be it
education, home, vehicles, or healthcare. With the increase in the number of connected …

A systematic review on Deep Learning approaches for IoT security

L Aversano, ML Bernardi, M Cimitile, R Pecori - Computer Science Review, 2021 - Elsevier
The constant spread of smart devices in many aspects of our daily life goes hand in hand
with the ever-increasing demand for appropriate mechanisms to ensure they are resistant …

[HTML][HTML] Security of IoT application layer protocols: Challenges and findings

G Nebbione, MC Calzarossa - Future Internet, 2020 - mdpi.com
IoT technologies are becoming pervasive in public and private sectors and represent
presently an integral part of our daily life. The advantages offered by these technologies are …

Denial of service attack detection through machine learning for the IoT

NF Syed, Z Baig, A Ibrahim, C Valli - Journal of Information and …, 2020 - Taylor & Francis
ABSTRACT Sustained Internet of Things (IoT) deployment and functioning are heavily
reliant on the use of effective data communication protocols. In the IoT landscape, the …

Security architecture and protocols for secure MQTT-SN

CS Park, HM Nam - IEEE Access, 2020 - ieeexplore.ieee.org
Message Queuing Telemetry Transport (MQTT) is a de facto standard for various Internet of
Things (IoT) and industrial IoT applications. The data produced by a publisher are delivered …

Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects

S Lakshminarayana, A Praseed… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most promising new millennial technologies, having
numerous applications in our surrounding environment. The fundamental goal of an IoT …

MQTT vulnerabilities, attack vectors and solutions in the internet of things (IoT)

AJ Hintaw, S Manickam, MF Aboalmaaly… - IETE Journal of …, 2023 - Taylor & Francis
ABSTRACT Internet of Things (IoT) paved the way for devices and machine communication
using TCP/IP protocol. Lightweight and stateless communication is imperative especially in …

Cyberphysical security of grid battery energy storage systems

RD Trevizan, J Obert, V De Angelis, TA Nguyen… - IEEE …, 2022 - ieeexplore.ieee.org
This paper presents a literature review on current practices and trends on cyberphysical
security of grid-connected battery energy storage systems (BESSs). Energy storage is critical …

Effective anomaly detection using deep learning in IoT systems

L Aversano, ML Bernardi, M Cimitile… - Wireless …, 2021 - Wiley Online Library
Anomaly detection in network traffic is a hot and ongoing research theme especially when
concerning IoT devices, which are quickly spreading throughout various situations of …

An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM

C Prajisha, AR Vasudevan - International Journal of Information Security, 2022 - Springer
Abstract Internet of Things (IoT) networks are becoming increasingly popular for monitoring
critical environments of various types. For the communication of IoT devices, several …