[HTML][HTML] Replay-attack detection and prevention mechanism in industry 4.0 landscape for secure SECS/GEM communications

MA Al-Shareeda, S Manickam, SA Laghari, A Jaisan - Sustainability, 2022 - mdpi.com
Starting from the First Industrial Revolution to the current and Fourth Industrial Revolution (or
Industry 4.0), various industrial machines are present in the market and manufacturing …

[HTML][HTML] An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns

J Roldán-Gómez, J Boubeta-Puig… - … Applications of Artificial …, 2023 - Elsevier
Abstract The Internet of Things (IoT) has grown rapidly to become the core of many areas of
application, leading to the integration of sensors, with IoT devices. However, the number of …

ViT4Mal: Lightweight Vision Transformer for Malware Detection on Edge Devices

A Ravi, V Chaturvedi, M Shafique - ACM Transactions on Embedded …, 2023 - dl.acm.org
There has been a tremendous growth of edge devices connected to the network in recent
years. Although these devices make our life simpler and smarter, they need to perform …

Secure Enhancement for MQTT Protocol Using Distributed Machine Learning Framework

NS Alotaibi, HI Sayed Ahmed, SOM Kamel… - Sensors, 2024 - mdpi.com
The Message Queuing Telemetry Transport (MQTT) protocol stands out as one of the
foremost and widely recognized messaging protocols in the field. It is often used to transfer …

Message queuing telemetry transport-secure connection: a power-efficient secure communication

S Bhardwaj, S Harit, Shilpa… - International Journal of …, 2023 - inderscienceonline.com
Trust must be established among the internet of things (IoT) devices to ensure successful
communication. The key to this trust lies in security enhancements in all IoT connectivity …

Open-Source Security Testing Tools for IoT Protocols-MQTT and Zigbee

M Praveen, A Raza, M Hasib - 2023 Advances in Science and …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) has become an integral part of our lives, but it also poses a
major security threat. As the number of IoT devices grows and more data is collected about …

A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)

VE Quincozes, SE Quincozes, JF Kazienko… - International Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) plays a fundamental role in contemporary society,
necessitating an in-depth comprehension of its application layer protocols, intertwined …

A Smart City Metaverse Using the Internet of Things with Cloud Security

MP Karthikeyan, MS Nidhya… - AI-Aided IoT …, 2023 - taylorfrancis.com
Ever since the advent of technology, humans have made deliberate efforts to mold it out for
their own convenience, comfort, and pleasure, which has led to consumption of resources …

Adaptive Lightweight Security for Performance Efficiency in Critical Healthcare Monitoring

I Ahmad, F Shahid, J Islam, KN Haque… - arXiv preprint arXiv …, 2024 - arxiv.org
The healthcare infrastructure requires robust security procedures, technologies, and policies
due to its critical nature. Since the Internet of Things (IoT) with its diverse technologies has …

[HTML][HTML] Linked data to streaming data sensors sources for direct access

D Calvetti, DL de Mattos Nascimento… - Brazilian Journal of …, 2024 - bjopm.org.br
Goal: Industrial operations are complex, and data sensors assure safety and reliable
information for production improvements. Multiple stakeholders can take advantage of data …