Uncover the latest breakthroughs and scholarly research in IoT Security with this collection of top research papers. These papers delve into various aspects of securing Internet of Things devices, providing valuable information for professionals, academics, and enthusiasts in the field. Whether you're looking to learn more about the challenges and solutions in IoT Security or seeking to advance your knowledge, this resource is designed to provide you with essential insights.
Looking for research-backed answers?Try AI Search
Sanaa. S. Abd El dayem
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
A security protocol to give a commitment in making sure about such sorts of condition is introduced by proposing another convention that can be actualized in specially appointed systems by taking out conceivable security weaknesses.
Bremnavas Ismail Mohideen, Basem Assiri
J. Inf. Knowl. Manag.
This paper mainly focuses on the classification of IoT, novel architecture considering the sensitivity of data, IoT security layers, review of security issues and acclaimed countermeasures.
Rocco Gagliardi, Marc Ruef
journal unavailable
It is suggested to split the system in smaller components and adopt different best-practices for each specific part to avoid duplication.
罗道渊, 蒋智广, 黄鑫
journal unavailable
The IOT-based Linux operation-level comprehensive security management platform has the advantages of good stability, high safety and reliability, good compatibility and powerful centralized management function.
Lisa Patterson, S. Chard, Bryan K. F. Ng + 1 more
journal unavailable
IoT user behavior alignment with Protection Motivation Theory (PMT) is investigated to better understand safety for everyday users of IoT consumer devices in the home.
Amala Nirmal Doss, Deepalkumar Shah, G. Smaisim + 2 more
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
The critical determinants of IoT technologies which can be used by the organisation in order to safeguard from the security attacks and relevant counter measures can be taking for attaining sustainable development are analyzed.
Olumide Babalola
Natural Language Processing
The article discusses the information security and privacy risks posed by the operationality of IoT as envisaged under the EU GDPR and makes a few recommendations on how to address the risks.
Prof. Shweta D. Joshi, Prof. Vidya A. Khairnar, Prof. Suvarna V. Somvanshi
International Journal of Advanced Research in Science, Communication and Technology
IoT's foundational technologies, including sensing, connectivity, data analytics and security, are reviewed to provide a holistic understanding of the ecosystem and major research challenges are discussed.
Adnan Yousif Dawod, M. F. Abdulqader, Qasim M. Zainel
Journal of Electrical Systems
The focus of this work is on the IoT-enabled MANET routing methods, i.e., homophone-based encryption with compression (HEC) technique, which offers a viable solution in this regard for data confidentiality.
This chapter provides information about the attacks at different layers of IoT architecture and mentions the benefits of technologies like blockchain and machine learning that can help to solve the security issues of IoT.
Erem Gökalp, M. Aydin
2018 3rd International Conference on Computer Science and Engineering (UBMK)
The concept of the IoT is taking a place in the life and it has some weekness of security, but how to manage it is explained.
A. Abbood, Qahtan Makki Shallal, M. Fadhel
Indonesian Journal of Electrical Engineering and Computer Science
This paper has analyzed and explain the technology of IoT along with its elements, security features, security issues, and threats that attached to each layer of IoT to guide the consideration of researchers into solve and understand the most serious problems in IoT environment.
Tasnimun Faika, Taesic Kim, Justin Ochoa + 3 more
2019 IEEE Industry Applications Society Annual Meeting
This paper explores blockchain technology for ensuring the communication and data security of an loT-enabled WBMS from malicious cyber-attacks and the proposed blockchain-based IoT network for WBMSs is validated by experimental studies.
Donna Dodson, D. Montgomery, Tim Polk + 24 more
journal unavailable
The NCCoE has demonstrated the ability to ensure that when an IoT device connects to a home or small-business network, MUD can be used to automatically permit network restrictions, thereby increasing the device’s resilience to network-based attacks.
Khuda Bux Jalbani, A. H. Jalbani, S. Soomro
Industrial Internet of Things and Cyber-Physical Systems
The proposed solution in this chapter is three-way authentication of IoT devices by generating tokens from the device serial number and from the few configuration devices at the network layer for high availability of IoT device services.
Mujahid Mohsin, Z. Anwar, G. Husari + 2 more
2016 IEEE Conference on Communications and Network Security (CNS)
IoTSAT formally models the generic behavior of IoT system of systems, based on device configurations, network topologies, user policies and IoT-specific attack surface, to measure system's resilience against potential attacks and identify threat vectors and specific attack techniques, which can be used to achieve higher-level adversary's objectives.
E. Chuma, L. L. Roger, Gabriel Gomes de Oliveira + 2 more
2020 IEEE International Smart Cities Conference (ISC2)
This work proposes a novel fall-detection system that uses a continuous-wave Doppler radar sensor to acquisition the elderly movements and sends this information thought the internet to a server with deep learning using a convolutional neural network (CNN) that identifies the fall.
S. Amit, A. S. Koshy, S. Samprita + 2 more
2019 International Conference on Communication and Electronics Systems (ICCES)
The aim of this project is to design and construct a home automation system which will switch on or off any household devices that are connected to it, using microcontroller, mobile or Alexa with the help of Wi-Fi.
Mohammad Nuruzzaman Bhuiyan, Md. Mahbubur Rahman, M. Billah + 1 more
IEEE Internet of Things Journal
This review analyzes security and privacy features consisting of data protection, network architecture, Quality of Services (QoS), app development, and continuous monitoring of healthcare that are facing difficulties in many IoT-based healthcare architectures.
Naim Karasekreter, U. Fidan, F. Başçiftçi
journal unavailable
In this work, a system design and application example is presented by synthesizing IoT and sensor network architectures and is described through a patented product, the open area security system.