Federated learning based privacy ensured sensor communication in IoT networks: a taxonomy, threats and attacks

SI Manzoor, S Jain, Y Singh, H Singh - IEEE Access, 2023 - ieeexplore.ieee.org
Our daily lives are significantly impacted by intelligent Internet of Things (IoT) application,
services, IoT gadgets, and more intelligent industries. Artificial Intelligence (AI) is anticipated …

Preserving balance between privacy and data integrity in edge-assisted Internet of Things

T Wang, MZA Bhuiyan, G Wang, L Qi… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) devices and the edge jointly broaden the IoT's sensing capability and
the monitoring scope for various applications. Though accessing sensing data and making …

A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge

JS Chavis, A Buczak, A Kunz, A Rubin… - 2020 IEEE Security …, 2020 - ieeexplore.ieee.org
Complex systems of IoT devices (SIoTD) are systems that have a single purpose but are
made up of multiple IoT devices. These systems are becoming ubiquitous, have complex …

A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

Edge computing assisted privacy-preserving data computation for IoT devices

X Xing, Z Qian, WL Li - Computer Communications, 2021 - Elsevier
Along with the ubiquitous deployment of IoT devices, requirements on sensing data
computation and analysis increase rapidly. However, the traditional cloud-based …

[图书][B] Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem

B Russell, D Van Duren - 2018 - books.google.com
A practical, indispensable security guide that will navigate you through the complex realm of
securely building and deploying systems in our IoT-connected world Key Features Learn …

The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective

C Wang, Z Yuan, P Zhou, Z Xu, R Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Mobile-edge computing (MEC) is a new computing paradigm that enables cloud computing
and information technology (IT) services to be delivered at the network's edge. By shifting …

[HTML][HTML] A survey on security in internet of things with a focus on the impact of emerging technologies

P Williams, IK Dutta, H Daoud, M Bayoumi - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) have opened the door to a world of unlimited possibilities for
implementations in varied sectors in society, but it also has many challenges. One of those …

[PDF][PDF] Poster: MicroFL: A Lightweight, Secure-by-Design Edge Network Fabric for Decentralized IoT Systems

R Xu, Y Chen, J Li - The Network and Distributed System …, 2020 - ndss-symposium.org
With the aggressive growth of smart environments, a large amount of data are generated by
edge devices in distributed Internet-of-Thing (IoT) hierarchies, consisting of the cloud, the …