Uncover the latest breakthroughs and scholarly research in IoT Security with this collection of top research papers. These papers delve into various aspects of securing Internet of Things devices, providing valuable information for professionals, academics, and enthusiasts in the field. Whether you're looking to learn more about the challenges and solutions in IoT Security or seeking to advance your knowledge, this resource is designed to provide you with essential insights.
Looking for research-backed answers?Try AI Search
Sanaa. S. Abd El dayem
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
A security protocol to give a commitment in making sure about such sorts of condition is introduced by proposing another convention that can be actualized in specially appointed systems by taking out conceivable security weaknesses.
Syed S. Rizvi, Andrew Kurtz, Joseph R. Pfeffer + 1 more
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
The primary goal of this research work is to advance the current state of the art in IoT research by identifying the critical domains where IoT is heavily used, the security requirements and challenges that IoT is currently facing, and the existing security solutions that have been proposed or implemented with their limitations.
Rishu Jain
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
A taxonomy of security requirements depending on the objectives of the attacks is proposed after a number of IoT security threats are studied and current security solutions are categorised and characterised according to their use cases.
Abla El Bekkali, M. Boulmalf, M. Essaaidi + 1 more
2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM)
This article is a systematic literature review (SLR) where the most basic and common architecture proposed for IoT with a security analysis of each layer is shown with a comparison of these solutions.
M. N. A. Dalaien, A. Bensefia, Salam Hoshang + 1 more
Research Anthology on Privatizing and Securing Data
The chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.
Shishir K. Shandilya, Smita Shandilya, Soon Ae Chun + 1 more
journal unavailable
In this report, I present all the IoT devices that I was able to scan in the CERN network along with their vulnerabilities. Also I will be providing a solution for all the vulnerabilities that I have found in different devices and what else can be done to mitigate them. The task in this project was aimed to study different devices installed in CERN and the protocols that these devices run on. All 15 types of devices installed on the GPN have to be scanned and all known exploits have to be tried in order to secure the devices for future use.
Israr Ahmed, A. P. Saleel, B. Beheshti + 2 more
2017 Fourth HCT Information Technology Trends (ITT)
Critical issues related to safety and privacy of IoT are discussed, including Identification, Authentication and device diversity are the real security and protection concern in IoT.
N. Seshadri, Sivakumar Dhakshinamoorthy
International journal of engineering research and technology
The design of smart home automation architecture is described that utilizes a smart phone application to remotely control various appliances like door access, fans, geysers, CCTV, lights, air-conditioning, power and water supply at home.
Tyler Williams, Jordan Frantsvog, Saeed Almalki
journal unavailable
Wi-fi vulnerabilities and unsafe practices Wireless networks secured with WPA2 were thought to be secure until October of 2017 when the Key Reinstallation Attack (KRACK) was announced by researchers at KU Leuven, a Belgium University.
Shivaji Kulkarni, Shrihari Durg, Nalini C. Iyer
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)
This paper discusses how data can be made secure for IoT using Cryptography, an emerging domain involving lnternet of Things (IoT) in Cryptography.
Nilima Dongre Jawade, M. Atique, Zeba A Shaik + 1 more
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT)
The survey identifies the less explored research gaps to group them and address the concerns related to device management, user management, key management, trust management and data management and the surveyed secured frameworks in IoT address the multiple dimensions of security concerns and their aspects.
K. Shaukat, Talha Mahboob Alam, I. Hameed + 3 more
2021 26th International Conference on Automation and Computing (ICAC)
What are the security challenges the IoT features face, what solutions are provided yet, and the open challenges, to enable analysts to pursue the forward works?
Abid Ali, Abdul Mateen, Abdul Hanan + 1 more
Technologies
The study uses a systematic literature review (SLR) technique and complete substantive literature is reviewed to find out the constructs and themes in the existing literature to propose a secure framework for the Internet of Things.
Malti Bansal, Marshal Nanda, Md. Nazir Husain
2021 6th International Conference on Inventive Computation Technologies (ICICT)
In today's world, technologies are closely connected to the authors' day-to-day life with a large number of variations, so there are several challenges in deploying any IoT-based devices at any place, and the most crucial challenges are security and privacy.
Mahmoud Badawy
2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)
Light is shed on a novel research trend, the Sustainable Secure Internet of Things (SS-IoT) that discusses IoT challenges regarding sustainability and security and helps researchers and developers interested in technology and environmental engineering.
Sherif El-Gendy, Marianne A. Azer
2020 15th International Conference on Computer Engineering and Systems (ICCES)
This paper focuses on the IoT devices applications and networks, in addition to the attack vectors and security requirements for IoT systems, as well as the organizational approach towards IoT security.
Navdeep Lata, Dr. Raman Kumar
Mathematical Statistician and Engineering Applications
Various IoT security models are described along with security challenges of IoT communications such as privacy, authentication, integrity of data, and service availability, mostly in hardware aspects.
Nagesh Ub, Nayana Ms, Shruthi Cs + 3 more
International Journal of Advanced Research in Science, Communication and Technology
Several IoT security attacks are examined and a taxonomy of the security requirements based on the attacks purposes is proposed, and recent security solutions are described and classified based on their application area.
S. M. Almtrafi, B. A. Alkhudadi, Gofran Sami + 1 more
journal unavailable
This paper explores recent published studies between 2017 and 2020 considering different security approaches of protection related to the authentication, integrity, availability and confidentiality and the different types of attacks in IoTs.
CoAP Vishwesh, Rajashekar
journal unavailable
This research article explored the security of CoAP over DTLS incurring many issues and proposed solutions as well as open challenges for future research.
Munirah Abdullahi Said
TMP Universal Journal of Research and Review Archives
All aspects of protection, including as component hardening, monitoring, firmware updates, access control, threat response, and vulnerability remediation, are included in robust IoT security.
M. Obaidat, Soumya Prakash, Debasis Giri
journal unavailable
This chapter discusses the secure solutions for IoT using biometric features of users as well as end users and demonstrates that biometric security is most feasible, reliable and efficient with respect to other existing security arrangements.
Hafiz MusabIqbal, Hashim Ali Khokhar, Usman Raza
International Journal of Advanced Trends in Computer Science and Engineering
The main focus of this paper is IoT related security and vulnerabilities that are caused the security and existing solutions and compare the existing study results to measure the issues.
It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.
A survey of IoT and Cloud Computing with a focus on the security issues of both technologies is presented, and it shows how the Cloud Computing technology improves the function of the IoT.
The broad usage areas of IoT, Security threats in the IoT ecosystems and finally the steps and the approaches to mitigate the threats are discussed.
Ibrahim R. Waz, M. Sobh, Ayman M. Bahaa-Eldin
2017 12th International Conference on Computer Engineering and Systems (ICCES)
This survey introduces IoT security items and how to achieve the requirements of these items in a constrained environment to guarantee security in every stage to guarantee continuity of security from one stage to another stage.
Ajitpal Singh
CompSciRN: Cyber Defense (Topic)
This paper may be an endeavor should arrange danger types, furthermore examine what's more describe intruders Also strike confronting IoT gadgets Furthermore administrations.
Rocco Gagliardi, Marc Ruef
journal unavailable
It is suggested to split the system in smaller components and adopt different best-practices for each specific part to avoid duplication.
K. Kumar
Journal of emerging technologies and innovative research
The suggestions presented in this paper are generally proposed for development by manufacturers of Internet objects, however they are designed to be decomposable by unprofessional but successful legislators and producers of institutional and administrative strategies and members of standard setting bodies.
P. William, Nandita Tripathi, Dr. Poornashankar + 3 more
2023 6th International Conference on Contemporary Computing and Informatics (IC3I)
The ability to give typical gadgets an extra technique for distinguishing proof and correspondence is known as the Internet of Things, and authentication specifically is of extraordinary significance given the potential mischief that could result from a maverick unauthenticated gadget in an IoT framework.
Samruddhi S. Burhade, Sonal N. Deshmukh
journal unavailable
The security and privacy aspect of IOT and various security threats which are given in each concept related to IOT are highlighted.
Nishika Gulia, Kamna Solanki, Sandeep Dalal
journal unavailable
The facial recognition system is analysed as the authentication mechanism in any IOT network and WSN is treated as the core data transfer network.
Bhaskr Mondal, Dilip Kumar, T. Mandal
journal unavailable
Characteristics, architecture and limitations of IoT has been conferred for improved understanding for the readers and a number of security challenges in IoT like encryption, key distribution, PKI, trust, etc.
M. Singh, Rajan Ma, Shivraj Vl + 1 more
2015 Fifth International Conference on Communication Systems and Network Technologies
A secure version of MQTT and SMQTT-SN protocols are proposed in which security feature is augmented to the existing MQ TT protocol based on Key/Cipher text Policy-Attribute Based Encryption (KP/CP-ABE) using lightweight Elliptic Curve Cryptography.
Magara Tinashe, Yousheng Zhou
J. Electr. Comput. Eng.
This paper systematically categorizes prevalent privacy, security, and interoperability issues within the context of the IoT layered architecture, to spearhead the discourse on IoT applications, privacy paradigms, and security frameworks, paving the way towards a resilient and interconnected future.
Muhammad Aqeel, Fahad Ali, M. W. Iqbal + 3 more
Journal of Sensors
In this study, more than 170 research articles are systematically studied to understand security and privacy issues and security threats and attacks are categorized on a single platform and an analysis is provided to explain how and to what extent they damage the targeted IoT systems.
R. Salikhov, V. Abdrakhmanov, I. N. Safargalin
Journal of Physics: Conference Series
The article provides a brief overview of existing security alarm solutions based on the Internet of Things (IoT) and Smart Home technologies and the idea of creating a budget solution based on Arduino and ESP32-CAM is presented.
P. S. Bangare, Kishor P. Patil
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
A new layered paradigm in general is suggested and extended with privacy and security apparatuses and layer documentation and implementation and evaluation of the suggested cloud/edge-based IoT system.
Krishan Kant Singh Gautam, Rajendra Kumar, Rakesh Yadav + 1 more
2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA)
The results provide a basis for driving practical improvements in the IoT security environment by encouraging manufacturers to priorities security measures, pushing the adoption of standards and laws, and improving user awareness and education.
S. Zeadally, Michail Tsikerdekis
International Journal of Communication Systems
This work investigates the potential of machine learning techniques in enhancing the security of IoT devices and focuses on the deployment of supervised, unsupervised learning techniques, and reinforcement learning for both host‐based and network‐based security solutions in the IoT environment.
Jenan Alawadhi, Amna Murad AlJanabi, M. Khder + 2 more
2022 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS)
The paper concludes with suggestions for how businesses can mitigate IoT security risks and explains how to maintain a laser-like focus on business risks.
authors unavailable
journal unavailable
Violations of user privacy such as remote surveillance via smart home cameras, multimedia or baby monitors; interference in the functioning of household devices; unexpected shutdowns and the failure of everyday services that are normally available – all of this is unacceptable to the end user.
K. Choo
Proceedings of the 2th Workshop on CPS&IoT Security and Privacy
Challenges associated with designing IoT cyber security and threat intelligence solutions will be discussed and potential opportunities for stakeholders in academia, industry and government are identified.
Rabah Kenaza, Ameur Khemane, H. Bendjenna + 2 more
2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)
An overview of the Internet of Things (IoT), which consists of four sections, will describe the five-layer IoT architecture and address IoT applications and the security challenges in the relevant major IoT architecture layers.
Hamoud M. Aldosari, V. Snás̃el, A. Abraham
journal unavailable
An independent single security layer is proposed to meet and manage the majority of security mechanisms distributed over other network layers of the IoT and could be used to verify the identity of both receiver and sender to assist in avoiding attacks.
Miraqa Safi, Barjinder Kaur, Sajjad Dadkhah + 4 more
2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)
This work proposes a distributive profiling mode to distinguish between IoT and non-IoT devices, map devices, identify the network that devices are attached to, and then continuously update the profile, and shows that Random Forest and Decision Tree classifiers outperformed the other ML classifiers by achieving an average accuracy, precision, recall, and f1-score above 90% with a shorter training time.
Eman Shaikh, Iman Mohiuddin, Ayisha Manzoor
2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)
The goal of the paper is to put forward the different security and privacy concerns that an IoT environment is facing and the existing mechanisms used for its protection and the solutions that need to be maintained to avoid theseSecurity and privacy threats.
Zahidah Mohamad Said, M. Zolkipli
Int. J. Recent Contributions Eng. Sci. IT
Based on the study, shows that Perception, Network and Application layers are the most open to security issues.
N. Thilakarathne, R. Samarasinghe, Dmck Dasanayake + 6 more
International Journal of Advanced Networking and Applications
Underlying security challenges in the standard IoT architecture are examined and categorize IoT vulnerabilities and outline methods used to ensure such IoT systems safety, and the future directions in terms of security and privacy are presented.