Optimization of secure wireless communications for IoT networks in the presence of eavesdroppers

SA Haider, MN Adil, MJ Zhao - Computer Communications, 2020 - Elsevier
… of 5G based wireless IoT network is of significant importance. Wireless 5G IoT systems
consist of a … During the data collection process of IoT, PHY security techniques can exploit the …

Performance analysis of LEO satellite-based IoT networks in the presence of interference

AK Dwivedi, S Chaudhari, N Varshney… - … Internet of Things …, 2023 - ieeexplore.ieee.org
… area network (LPWAN) technologies like Sigfox and long range wide area network (LoRaWAN)
[8], [9], but their performance has not been explored for satellite-based IoT networks as …

A review of IoT network management: Current status and perspectives

M Aboubakar, M Kellil, P Roux - Journal of King Saud University-Computer …, 2022 - Elsevier
… Nowadays, IoT environments are characterized by the presence of a large number of
heterogeneous and resource constrained devices often massively deployed in an area of interest …

Classifying security attacks in IoT networks using supervised learning

C Ioannou, V Vassiliou - 2019 15th International conference on …, 2019 - ieeexplore.ieee.org
… Abstract—Machine learning models have long be proposed to detect the presence of
unauthorized activity within computer networks. They are used as anomaly detection techniques to …

Efficient resource allocation for IoT cellular networks in the presence of inter-band interference

SH Chae, SW Jeon, C Jeong - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… In Section IV, we evaluate the sum rate of the IoT network in conjunction with the
proposed algorithms in various aspects and then discuss the results. Finally, Section V offers …

Virtual IoT HoneyNets to mitigate cyberattacks in SDN/NFV-enabled IoT networks

AM Zarca, JB Bernabe, A Skarmeta… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
… to the real IoT environment deployed in production. Since an IoT network is composed of …
[3], specially customized for constrained IoT devices, our proposal is able to set up virtual …

A machine learning approach for indirect human presence detection using IOT devices

R Madeira, L Nunes - 2016 Eleventh International Conference …, 2016 - ieeexplore.ieee.org
… that explicitly detect human presence, like motion detectors … , but not limited to, direct presence
detectors. The solution rests … presence without any information based on direct presence

IoT for real time presence sensing on the 5G EVE infrastructure

R Rusca, C Casetti, P Giaccone - … and Computer Networking …, 2021 - ieeexplore.ieee.org
IoT use case includes an edge cloud environment, where edge applications are realized by
combining multiple Virtual Network … the RAN (Radio Access Network) to the OneM2M server […

Experiments with security and privacy in IoT networks

MR Schurgot, DA Shinberg… - … Multimedia Networks  …, 2015 - ieeexplore.ieee.org
We explore the risks to security and privacy in IoT networks by setting up an inexpensive
home automation network and performing a set of experiments intended to study attacks and …

A framework for anomaly detection and classification in Multiple IoT scenarios

F Cauteruccio, L Cinelli, E Corradini… - Future Generation …, 2021 - Elsevier
… A presence anomaly denotes that there is a strong variation (ie, increase or decrease) in
the … A success anomaly shows that, although there is no presence anomaly from ι j k to ι q k , …