Uncover the latest breakthroughs and scholarly research in IoT Security with this collection of top research papers. These papers delve into various aspects of securing Internet of Things devices, providing valuable information for professionals, academics, and enthusiasts in the field. Whether you're looking to learn more about the challenges and solutions in IoT Security or seeking to advance your knowledge, this resource is designed to provide you with essential insights.
Looking for research-backed answers?Try AI Search
Syed S. Rizvi, Andrew Kurtz, Joseph R. Pfeffer + 1 more
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
The primary goal of this research work is to advance the current state of the art in IoT research by identifying the critical domains where IoT is heavily used, the security requirements and challenges that IoT is currently facing, and the existing security solutions that have been proposed or implemented with their limitations.
Abla El Bekkali, M. Boulmalf, M. Essaaidi + 1 more
2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM)
This article is a systematic literature review (SLR) where the most basic and common architecture proposed for IoT with a security analysis of each layer is shown with a comparison of these solutions.
N. Seshadri, Sivakumar Dhakshinamoorthy
International journal of engineering research and technology
The design of smart home automation architecture is described that utilizes a smart phone application to remotely control various appliances like door access, fans, geysers, CCTV, lights, air-conditioning, power and water supply at home.
Israr Ahmed, A. P. Saleel, B. Beheshti + 2 more
2017 Fourth HCT Information Technology Trends (ITT)
Critical issues related to safety and privacy of IoT are discussed, including Identification, Authentication and device diversity are the real security and protection concern in IoT.
Sanaa. S. Abd El dayem
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
A security protocol to give a commitment in making sure about such sorts of condition is introduced by proposing another convention that can be actualized in specially appointed systems by taking out conceivable security weaknesses.
Tyler Williams, Jordan Frantsvog, Saeed Almalki
journal unavailable
Wi-fi vulnerabilities and unsafe practices Wireless networks secured with WPA2 were thought to be secure until October of 2017 when the Key Reinstallation Attack (KRACK) was announced by researchers at KU Leuven, a Belgium University.
Shishir K. Shandilya, Smita Shandilya, Soon Ae Chun + 1 more
journal unavailable
In this report, I present all the IoT devices that I was able to scan in the CERN network along with their vulnerabilities. Also I will be providing a solution for all the vulnerabilities that I have found in different devices and what else can be done to mitigate them. The task in this project was aimed to study different devices installed in CERN and the protocols that these devices run on. All 15 types of devices installed on the GPN have to be scanned and all known exploits have to be tried in order to secure the devices for future use.
Shivaji Kulkarni, Shrihari Durg, Nalini C. Iyer
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)
This paper discusses how data can be made secure for IoT using Cryptography, an emerging domain involving lnternet of Things (IoT) in Cryptography.
CoAP Vishwesh, Rajashekar
journal unavailable
This research article explored the security of CoAP over DTLS incurring many issues and proposed solutions as well as open challenges for future research.
Miranda Kajtazi, Bahtijar Vogel, Joseph Bugeja + 1 more
journal unavailable
A model for Internet of Things practitioners and researchers on how to use security thinking in parallel with the IoT technological developments is proposed and highlights continuous security thinking as a serious matter to sustain IoT development with positive outcomes for its users.
M. N. A. Dalaien, A. Bensefia, Salam Hoshang + 1 more
Research Anthology on Privatizing and Securing Data
The chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.
The broad usage areas of IoT, Security threats in the IoT ecosystems and finally the steps and the approaches to mitigate the threats are discussed.
A survey of IoT and Cloud Computing with a focus on the security issues of both technologies is presented, and it shows how the Cloud Computing technology improves the function of the IoT.
Munirah Abdullahi Said
TMP Universal Journal of Research and Review Archives
All aspects of protection, including as component hardening, monitoring, firmware updates, access control, threat response, and vulnerability remediation, are included in robust IoT security.
Ajitpal Singh
CompSciRN: Cyber Defense (Topic)
This paper may be an endeavor should arrange danger types, furthermore examine what's more describe intruders Also strike confronting IoT gadgets Furthermore administrations.
Hafiz MusabIqbal, Hashim Ali Khokhar, Usman Raza
International Journal of Advanced Trends in Computer Science and Engineering
The main focus of this paper is IoT related security and vulnerabilities that are caused the security and existing solutions and compare the existing study results to measure the issues.
Sherif El-Gendy, Marianne A. Azer
2020 15th International Conference on Computer Engineering and Systems (ICCES)
This paper focuses on the IoT devices applications and networks, in addition to the attack vectors and security requirements for IoT systems, as well as the organizational approach towards IoT security.
Rishu Jain
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
A taxonomy of security requirements depending on the objectives of the attacks is proposed after a number of IoT security threats are studied and current security solutions are categorised and characterised according to their use cases.
M. Singh, Rajan Ma, Shivraj Vl + 1 more
2015 Fifth International Conference on Communication Systems and Network Technologies
A secure version of MQTT and SMQTT-SN protocols are proposed in which security feature is augmented to the existing MQ TT protocol based on Key/Cipher text Policy-Attribute Based Encryption (KP/CP-ABE) using lightweight Elliptic Curve Cryptography.
Ibrahim R. Waz, M. Sobh, Ayman M. Bahaa-Eldin
2017 12th International Conference on Computer Engineering and Systems (ICCES)
This survey introduces IoT security items and how to achieve the requirements of these items in a constrained environment to guarantee security in every stage to guarantee continuity of security from one stage to another stage.
Nishika Gulia, Kamna Solanki, Sandeep Dalal
journal unavailable
The facial recognition system is analysed as the authentication mechanism in any IOT network and WSN is treated as the core data transfer network.
It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.
Rocco Gagliardi, Marc Ruef
journal unavailable
It is suggested to split the system in smaller components and adopt different best-practices for each specific part to avoid duplication.
K. Kumar
Journal of emerging technologies and innovative research
The suggestions presented in this paper are generally proposed for development by manufacturers of Internet objects, however they are designed to be decomposable by unprofessional but successful legislators and producers of institutional and administrative strategies and members of standard setting bodies.
Bhaskr Mondal, Dilip Kumar, T. Mandal
journal unavailable
Characteristics, architecture and limitations of IoT has been conferred for improved understanding for the readers and a number of security challenges in IoT like encryption, key distribution, PKI, trust, etc.
Samruddhi S. Burhade, Sonal N. Deshmukh
journal unavailable
The security and privacy aspect of IOT and various security threats which are given in each concept related to IOT are highlighted.
M. Obaidat, Soumya Prakash, Debasis Giri
journal unavailable
This chapter discusses the secure solutions for IoT using biometric features of users as well as end users and demonstrates that biometric security is most feasible, reliable and efficient with respect to other existing security arrangements.
Hamoud M. Aldosari, V. Snás̃el, A. Abraham
journal unavailable
An independent single security layer is proposed to meet and manage the majority of security mechanisms distributed over other network layers of the IoT and could be used to verify the identity of both receiver and sender to assist in avoiding attacks.
authors unavailable
journal unavailable
Violations of user privacy such as remote surveillance via smart home cameras, multimedia or baby monitors; interference in the functioning of household devices; unexpected shutdowns and the failure of everyday services that are normally available – all of this is unacceptable to the end user.
Nilima Dongre Jawade, M. Atique, Zeba A Shaik + 1 more
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT)
The survey identifies the less explored research gaps to group them and address the concerns related to device management, user management, key management, trust management and data management and the surveyed secured frameworks in IoT address the multiple dimensions of security concerns and their aspects.
K. Shaukat, Talha Mahboob Alam, I. Hameed + 3 more
2021 26th International Conference on Automation and Computing (ICAC)
What are the security challenges the IoT features face, what solutions are provided yet, and the open challenges, to enable analysts to pursue the forward works?
Muath A. Obaidat, Matluba Khodjaeva, S. Obeidat + 2 more
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
This paper proposes a novel security architecture framework for IoT that helps build trust between different entities and systems and addresses privacy and security requirements and challenges of IoT different from any other types of communications.
Imran, S. Ali, Muhammad Alam + 1 more
Journal of Independent Studies and Research Computing
This study reviews the IoT methodologies in the light of qualitative research and identifies the IoT privacy and security issues from a different perspective and also finds out which security issue is mostly discussed in the last few years which elaborated as a basis for further research.
Faizan Khursheeed, M. Sami-Ud-Din, Dr.Irshad Ahmed Sumra + 1 more
2020 3rd International Conference on Advancements in Computational Sciences (ICACS)
This study is aimed to be a helpful guidebook to learn the vulnerabilities and threats related to security in IoT and increases the security design.
R.Vignesh, A.Samydurai, Student
journal unavailable
_______________ Abstract - This paper confers a survey and an investigates of the current status and analysis of Internet of things (IoT) security. The IoT structure pursue to append anyone with anything, anywhere. As against to the fixed Internet, in addition to humans, an IoT fastens a large number of machines, resource-coerced devices and sensors using different wired and wireless networks. An IoT normally has a three imaginary layers consisting of realization, Network
Abhijit Sudam Pavashe, Ankita Bajirao Sawant, Kishor Laxman Ghadage
International Journal of Advanced Research in Science, Communication and Technology
The paper delves into the various privacy and security issues arising from IoT, including data breaches, identity theft, and unauthorized access, and discusses the different approaches and strategies that can be used to mitigate these risks, including encryption, access control, and data protection measures.
Mikko Vermanen, Juhani Naskali, Ville Harkke + 1 more
journal unavailable
The ownership and control of information is clarified on conceptual and practical levels and three perspectives are investigated from the following three perspectives: 1) organisational level, 2) technical level, and 3) ethical ownership.
This paper is the review of energy auditing and analysis based on IoT monitoring mechanism and develops a dual deep learning by using energy meter readings which learns the behavior of the system in normal condition.
D. Triwahyuni
Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities
The results of the study found that the massive development of IoT creates information vulnerability that threatens national security as well as global security.
Eeshan Pandey, Varshi Gupta, Sir Padampat
journal unavailable
This paper will discuss major security concerns and how to overcome them using various algorithms for developing field such as IoT.
D. Stevanović, D. Djurdjević
journal unavailable
This article starts from the presumption that multiplication of censors and users, which is integral to development of the Internet of things, includes the proportional rise in number of points for possible intrusion into systems, and suggests a state can point out to certain characteristics and aid promotion of trust and transparency in the implementation of new technologies.
B. Kumar, Sheetal B. Prasad
journal unavailable
There is a need for a framework or other types of guidance for assessing IoT cyber security to provide an informed approach to securing devices and the ecosystems in which they are set up.
Prashant Kumar, Yadav Surjeet Kumar
journal unavailable
Here the authors will discuss about security issues, arise in IoT communication, which uses internet to establish connection between things and user, hence security concern of that communication channel will become most important.
N. S. Almakhdhub, Abraham A. Clements, Mathias Payer + 1 more
journal unavailable
IoT2, a benchmark suite and evaluation framework to address pressing challenges and limitations for evaluating IoT-μCs security and demonstrate IoT2 ability by evaluating three defense mechanisms is introduced.
R. S. Mohammed, A. H. Mohammed, F. N. Abbas
2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE)
This paper study the recent IoT Security researches and classifies them into the following tends Cryptography, Authentication, Blockchain, and data privacy preserving.
M. Nawir, Amiza Amir, N. Yaakob + 1 more
2016 3rd International Conference on Electronic Design (ICED)
This paper studies the network security matters in the smart home, health care and transportation domains, and taxonomy of security attacks within IoT networks is constructed to assist IoT developers for better awareness of the risk of security flaws.
Muhammad Sarmad Masood, Kamini Bajaj, Mohamad Michael Rajab
2018 4th International Conference for Convergence in Technology (I2CT)
This paper critically analyzes four most effective and important domains of architectures and highlights the issues that need attention in the growing progress of internet and hence loT.
Nagesh Ub, Nayana Ms, Shruthi Cs + 3 more
International Journal of Advanced Research in Science, Communication and Technology
Several IoT security attacks are examined and a taxonomy of the security requirements based on the attacks purposes is proposed, and recent security solutions are described and classified based on their application area.
Abid Ali, Abdul Mateen, Abdul Hanan + 1 more
Technologies
The study uses a systematic literature review (SLR) technique and complete substantive literature is reviewed to find out the constructs and themes in the existing literature to propose a secure framework for the Internet of Things.
S. M. Almtrafi, B. A. Alkhudadi, Gofran Sami + 1 more
journal unavailable
This paper explores recent published studies between 2017 and 2020 considering different security approaches of protection related to the authentication, integrity, availability and confidentiality and the different types of attacks in IoTs.