BRIoT: Behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems

V Sharma, I You, K Yim, R Chen, JH Cho - IEEE Access, 2019 - ieeexplore.ieee.org
The identification of vulnerabilities in a mission-critical system is one of the challenges faced
by a cyber-physical system (CPS). The incorporation of embedded Internet of Things (IoT) …

Lightweight misbehavior detection management of embedded IoT devices in medical cyber physical systems

G Choudhary, PV Astillo, I You, K Yim… - … on Network and …, 2020 - ieeexplore.ieee.org
We propose a lightweight specification-based misbehavior detection management
technique to efficiently and effectively detect misbehavior of an IoT device embedded in a …

IoT-praetor: Undesired behaviors detection for IoT devices

J Wang, S Hao, R Wen, B Zhang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Due to insecure design and configuration, the Internet-of-Things (IoT) devices are
vulnerable to various security issues. In most attacks against IoT, eg, Mirai, attackers control …

Anomaly detection/prediction for the internet of things: State of the art and the future

XX Lin, P Lin, EH Yeh - IEEE Network, 2020 - ieeexplore.ieee.org
Anomaly detection/prediction is the first step to secure IoT systems. It usually relies on wide
domain knowledge to build up the tools to automatically detect/predict abnormal events or …

Learning latent representation for IoT anomaly detection

L Vu, QU Nguyen, DN Nguyen… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) has emerged as a cutting-edge technology that is changing human
life. The rapid and widespread applications of IoT, however, make cyberspace more …

An automated context-aware IoT vulnerability assessment rule-set generator

F Hashmat, SG Abbas, S Hina, GA Shah… - Computer …, 2022 - Elsevier
While introducing unprecedented applications, Internet of Things (IoT) has simultaneously
provoked acute security challenges, in the form of the vulnerabilities. Mainly because …

Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data

RW Wardhani, DSC Putranto, U Jo, H Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Securing the Internet of Things (IoT) against cyber threats is a formidable challenge, and
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …

[HTML][HTML] A model checking-based security analysis framework for IoT systems

Z Fang, H Fu, T Gu, Z Qian, T Jaeger, P Hu… - High-Confidence …, 2021 - Elsevier
IoT systems are revolutionizing our life by providing ubiquitous computing, inter-connectivity,
and automated control. However, the increasing system complexity poses huge challenges …

AntiConcealer: Reliable detection of adversary concealed behaviors in EdgeAI-assisted IoT

J Zhang, MZA Bhuiyan, X Yang, T Wang… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is one of the rapidly developing technologies today that attract huge
real-world applications. However, the reality is that IoT is easily vulnerable to numerous …

A comprehensive study of anomaly detection schemes in IoT networks using machine learning algorithms

A Diro, N Chilamkurti, VD Nguyen, W Heyne - Sensors, 2021 - mdpi.com
The Internet of Things (IoT) consists of a massive number of smart devices capable of data
collection, storage, processing, and communication. The adoption of the IoT has brought …