Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey

S Zaman, K Alhazmi, MA Aseeri, MR Ahmed… - Ieee …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …

[PDF][PDF] Attack and anomaly detection in iot networks using machine learning techniques: A review

SH Haji, SY Ameen - Asian J. Res. Comput. Sci, 2021 - researchgate.net
ABSTRACT The Internet of Things (IoT) is one of today's most rapidly growing technologies.
It is a technology that allows billions of smart devices or objects known as" Things" to collect …

A systematic review on Deep Learning approaches for IoT security

L Aversano, ML Bernardi, M Cimitile, R Pecori - Computer Science Review, 2021 - Elsevier
The constant spread of smart devices in many aspects of our daily life goes hand in hand
with the ever-increasing demand for appropriate mechanisms to ensure they are resistant …

IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges

P Anand, Y Singh, A Selwal, M Alazab, S Tanwar… - IEEE …, 2020 - ieeexplore.ieee.org
Over the last few decades, sustainable computing has been widely used in areas like social
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …

Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures

N Waheed, X He, M Ikram, M Usman… - ACM computing …, 2020 - dl.acm.org
Security and privacy of users have become significant concerns due to the involvement of
the Internet of Things (IoT) devices in numerous applications. Cyber threats are growing at …

Security in mobile edge caching with reinforcement learning

L Xiao, X Wan, C Dai, X Du, X Chen… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
Mobile edge computing usually uses caching to support multimedia contents in 5G mobile
Internet to reduce the computing overhead and latency. Mobile edge caching (MEC) …

Machine-learning-assisted security and privacy provisioning for edge computing: A survey

S Singh, R Sulthana, T Shewale… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …

A survey on internet-of-things security: threats and emerging countermeasures

D Swessi, H Idoudi - Wireless Personal Communications, 2022 - Springer
Internet of things (IoT) is a world wide network and set of paradigms that are intended to
allow communications between anything, anytime and anywhere. However, connected …