An attack-resilient architecture for the Internet of Things

HMJ Almohri, LT Watson… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With current IoT architectures, once a single device in a network is compromised, it can be
used to disrupt the behavior of other devices on the same network. Even though system …

Network-level security for the Internet of Things: Opportunities and challenges

HH Gharakheili, A Sivanathan, A Hamza… - Computer, 2019 - ieeexplore.ieee.org
Smart environments with many Internet of Things (IoT) devices are at significant risk of
cyberattacks, putting private data and personal safety in danger. While IoT device …

Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things

T Yu, V Sekar, S Seshan, Y Agarwal, C Xu - Proceedings of the 14th …, 2015 - dl.acm.org
The Internet-of-Things (IoT) has quickly moved from the realm of hype to reality with
estimates of over 25 billion devices deployed by 2020. While IoT has huge potential for …

[HTML][HTML] Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception

Z Rehman, I Gondal, M Ge, H Dong, M Gregory… - Computers & …, 2024 - Elsevier
Abstract The Internet of Things (IoT) has become increasingly prevalent in various aspects of
our lives, enabling billions of devices to connect and communicate seamlessly. However …

A method of classifying IoT devices based on attack sensitivity

H Wang, D Guo, J Wei, J Li - Journal of Information Security and …, 2024 - Elsevier
The emergence of IoT has introduced new security concerns, particularly the detection of
large-scale network attacks initiated by compromised IoT devices. The diverse nature of IoT …

Classification of device behaviour in internet of things infrastructures: towards distinguishing the abnormal from security threats

R Ferrando, P Stacey - Proceedings of the 1st International Conference …, 2017 - dl.acm.org
Increasingly Internet of Things (IoT) devices are being woven into the fabric of our physical
world. With this rapidly expanding pervasive deployment of IoT devices, and supporting …

Autoencoder-based feature construction for IoT attacks clustering

J Haseeb, M Mansoori, Y Hirose, H Al-Sahaf… - Future Generation …, 2022 - Elsevier
Variations in commands executed as part of the attack process can be used to determine the
behavioural patterns of IoT attacks. Existing approaches rely on the domain knowledge of …

Securing internet of things devices using the network context

M Trnka, J Svacina, T Cerny, E Song… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) devices have been widely adopted in recent years. Unlike
conventional information systems, IoT solutions have greater access to real-world contextual …

Combining device Behavioral models and building schema for cybersecurity of large-scale IoT infrastructure

A Hamza, HH Gharakheili, T Pering… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Modern buildings are increasingly getting connected by adopting a range of IoT devices and
applications from video surveillance and lighting to people counting and access control. It …

IoTSAT: A formal framework for security analysis of the internet of things (IoT)

M Mohsin, Z Anwar, G Husari… - … IEEE conference on …, 2016 - ieeexplore.ieee.org
The new attack surface being crafted by the huge influx of IoT devices is both formidable and
unpredictable, as it introduces a rich set of unexplored attack techniques and unknown …