Internet of things security: A top-down survey

DE Kouicem, A Bouabdallah, H Lakhlef - Computer Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) is one of the promising technologies that has attracted a lot
of attention in both industrial and academic fields these years. It aims to integrate seamlessly …

Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions

S Arisdakessian, OA Wahab, A Mourad… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
In the past several years, the world has witnessed an acute surge in the production and
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …

Trust management techniques for the Internet of Things: A survey

IU Din, M Guizani, BS Kim, S Hassan, MK Khan - IEEE Access, 2018 - ieeexplore.ieee.org
A vision of the future Internet is introduced in such a fashion that various computing devices
are connected together to form a network called Internet of Things (IoT). This network will …

A framework for automating security analysis of the internet of things

M Ge, JB Hong, W Guttmann, DS Kim - Journal of Network and Computer …, 2017 - Elsevier
Abstract The Internet of Things (IoT) is enabling innovative applications in various domains.
Due to its heterogeneous and wide-scale structure, it introduces many new security issues …

A survey and classification of security and privacy research in smart healthcare systems

A Algarni - IEEE Access, 2019 - ieeexplore.ieee.org
Advances in wireless technology have resulted in the development of smart healthcare
systems (SHSs). In SHS, sensors, wearables, and devices monitor a patient's vital …

A game theoretic approach for privacy preserving model in IoT-based transportation

AR Sfar, Y Challal, P Moyal… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Internet of Things applications using sensors and actuators raise new privacy related
threats, such as drivers and vehicles tracking and profiling. These threats can be addressed …

Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: a contract design approach

J Chen, Q Zhu - IEEE Transactions on Information Forensics …, 2017 - ieeexplore.ieee.org
In this paper, we aim to establish a holistic framework that integrates the cyber-physical
layers of a cloud-enabled Internet of Controlled Things (IoCT) through the lens of contract …

BEMPAS: a decentralized employee performance assessment system based on blockchain for smart city governance

EB Sifah, H Xia, CNA Cobblah, Q Xia, J Gao… - IEEE Access, 2020 - ieeexplore.ieee.org
In recent years, the use of blockchain has gained attention in industrial interventions and
research. Blockchain technologies can be particularly utilized in the domain of Smart …

: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things

R Zhang, Q Zhu - IEEE Transactions on Information Forensics …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is highly vulnerable to emerging Advanced Persistent Threats (APTs)
that are often operated by well-resourced adversaries. Achieving perfect security for IoT …