Top Research Papers on IoT Security
Uncover the latest breakthroughs and scholarly research in IoT Security with this collection of top research papers. These papers delve into various aspects of securing Internet of Things devices, providing valuable information for professionals, academics, and enthusiasts in the field. Whether you're looking to learn more about the challenges and solutions in IoT Security or seeking to advance your knowledge, this resource is designed to provide you with essential insights.
Looking for research-backed answers?Try AI Search
SECURITY For INTERNET OF THINGS-IOT
2 Citations 2021Sanaa. S. Abd El dayem
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
A security protocol to give a commitment in making sure about such sorts of condition is introduced by proposing another convention that can be actualized in specially appointed systems by taking out conceivable security weaknesses.
Internet of Things (IoT): Classification, Secured Architecture Based on Data Sensitivity, Security Issues and Their Countermeasures
6 Citations 2021Bremnavas Ismail Mohideen, Basem Assiri
J. Inf. Knowl. Manag.
This paper mainly focuses on the classification of IoT, novel architecture considering the sensitivity of data, IoT security layers, review of security issues and acclaimed countermeasures.
Internet of Things - Security in an IoT Solution
No citations 2019Rocco Gagliardi, Marc Ruef
journal unavailable
It is suggested to split the system in smaller components and adopt different best-practices for each specific part to avoid duplication.
IOT (Internet of Things)-based Linux operation-level comprehensive security management platform
No citations 2011罗道渊, 蒋智广, 黄鑫
journal unavailable
The IOT-based Linux operation-level comprehensive security management platform has the advantages of good stability, high safety and reliability, good compatibility and powerful centralized management function.
Internet of Things (IoT) Privacy and Security: A User-Focused Study of Aotearoa New Zealand Home Users
4 Citations 2021Lisa Patterson, S. Chard, Bryan K. F. Ng + 1 more
journal unavailable
IoT user behavior alignment with Protection Motivation Theory (PMT) is investigated to better understand safety for everyday users of IoT consumer devices in the home.
A Comprehensive Analysis of Internet of Things (IOT) in Enhancing Data Security for Better System Integrity - A Critical Analysis on the Security Attacks and Relevant Countermeasures
17 Citations 2022Amala Nirmal Doss, Deepalkumar Shah, G. Smaisim + 2 more
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
The critical determinants of IoT technologies which can be used by the organisation in order to safeguard from the security attacks and relevant counter measures can be taking for attaining sustainable development are analyzed.
Internet of Things (IoT): Data Security and Privacy Concerns under the General Data Protection Regulation (GDPR)
5 Citations 2021Olumide Babalola
Natural Language Processing
The article discusses the information security and privacy risks posed by the operationality of IoT as envisaged under the EU GDPR and makes a few recommendations on how to address the risks.
A Comprehensive Study on Internet of Things (IoT): State-of-the-Art: Security Challenges, Future Directions, Applications and Opportunities.
3 Citations 2024Prof. Shweta D. Joshi, Prof. Vidya A. Khairnar, Prof. Suvarna V. Somvanshi
International Journal of Advanced Research in Science, Communication and Technology
IoT's foundational technologies, including sensing, connectivity, data analytics and security, are reviewed to provide a holistic understanding of the ecosystem and major research challenges are discussed.
Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management: Enhancing Internet Protocol-Based IoT Device and Network Security
5 Citations 2025Jeffrey Marron, Murugiah Souppaya, Michael Fagan + 26 more
journal unavailable
<jats:p/>
Enhancing Security and Sensors Emerging Internet of Things (IoT) Technology of Homophone-Based Encryption using MANET‐IoT Networks Technique
No citations 2024Adnan Yousif Dawod, M. F. Abdulqader, Qasim M. Zainel
Journal of Electrical Systems
The focus of this work is on the IoT-enabled MANET routing methods, i.e., homophone-based encryption with compression (HEC) technique, which offers a viable solution in this regard for data confidentiality.
Security for IoT
No citations 2021Anjum Sheikh, Asha Ambhaikar, Sunil Kumar
IoT Protocols and Applications for Improving Industry, Environment, and Society
This chapter provides information about the attacks at different layers of IoT architecture and mentions the benefits of technologies like blockchain and machine learning that can help to solve the security issues of IoT.
Security of IoT
1 Citations 2018Erem Gökalp, M. Aydin
2018 3rd International Conference on Computer Science and Engineering (UBMK)
The concept of the IoT is taking a place in the life and it has some weekness of security, but how to manage it is explained.
Internet of things (IoT): a technology review, security issues, threats, and open challenges
9 Citations 2020A. Abbood, Qahtan Makki Shallal, M. Fadhel
Indonesian Journal of Electrical Engineering and Computer Science
This paper has analyzed and explain the technology of IoT along with its elements, security features, security issues, and threats that attached to each layer of IoT to guide the consideration of researchers into solve and understand the most serious problems in IoT environment.
A Blockchain-Based Internet of Things (IoT) Network for Security-Enhanced Wireless Battery Management Systems
26 Citations 2019Tasnimun Faika, Taesic Kim, Justin Ochoa + 3 more
2019 IEEE Industry Applications Society Annual Meeting
This paper explores blockchain technology for ensuring the communication and data security of an loT-enabled WBMS from malicious cyber-attacks and the proposed blockchain-based IoT network for WBMSs is validated by experimental studies.
Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)
28 Citations 2021Donna Dodson, D. Montgomery, Tim Polk + 24 more
journal unavailable
The NCCoE has demonstrated the ability to ensure that when an IoT device connects to a home or small-business network, MUD can be used to automatically permit network restrictions, thereby increasing the device’s resilience to network-based attacks.
IoT Security
47 Citations 2020Khuda Bux Jalbani, A. H. Jalbani, S. Soomro
Industrial Internet of Things and Cyber-Physical Systems
The proposed solution in this chapter is three-way authentication of IoT devices by generating tokens from the device serial number and from the few configuration devices at the network layer for high availability of IoT device services.
IoTSAT: A formal framework for security analysis of the internet of things (IoT)
77 Citations 2016Mujahid Mohsin, Z. Anwar, G. Husari + 2 more
2016 IEEE Conference on Communications and Network Security (CNS)
IoTSAT formally models the generic behavior of IoT system of systems, based on device configurations, network topologies, user policies and IoT-specific attack surface, to measure system's resilience against potential attacks and identify threat vectors and specific attack techniques, which can be used to achieve higher-level adversary's objectives.
Internet of Things (IoT) Privacy–Protected, Fall-Detection System for the Elderly Using the Radar Sensors and Deep Learning
23 Citations 2020E. Chuma, L. L. Roger, Gabriel Gomes de Oliveira + 2 more
2020 IEEE International Smart Cities Conference (ISC2)
This work proposes a novel fall-detection system that uses a continuous-wave Doppler radar sensor to acquisition the elderly movements and sends this information thought the internet to a server with deep learning using a convolutional neural network (CNN) that identifies the fall.
Internet of Things (IoT) enabled Sustainable Home Automation along with Security using Solar Energy
6 Citations 2019S. Amit, A. S. Koshy, S. Samprita + 2 more
2019 International Conference on Communication and Electronics Systems (ICCES)
The aim of this project is to design and construct a home automation system which will switch on or off any household devices that are connected to it, using microcontroller, mobile or Alexa with the help of Wi-Fi.
Internet of Things (IoT): A Review of Its Enabling Technologies in Healthcare Applications, Standards Protocols, Security, and Market Opportunities
321 Citations 2021Mohammad Nuruzzaman Bhuiyan, Md. Mahbubur Rahman, M. Billah + 1 more
IEEE Internet of Things Journal
This review analyzes security and privacy features consisting of data protection, network architecture, Quality of Services (QoS), app development, and continuous monitoring of healthcare that are facing difficulties in many IoT-based healthcare architectures.