Security in Internet of Things: A review

NA Khan, A Awang, SAA Karim - IEEE access, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is the paramount virtual network that enables remote users to access
connected multimedia devices. It has dragged the attention of the community because it …

Reinforcement learning-based physical-layer authentication for controller area networks

L Xiao, X Lu, T Xu, W Zhuang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In controller area networks (CANs), electronic control units (ECUs) such as telematics ECUs
and on-board diagnostic ports must protect the message exchange from spoofing attacks. In …

Towards spoofing resistant next generation IoT networks

MR Nosouhi, K Sood, M Grobler… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The potential vulnerability to wireless spoofing attacks is still a critical concern for Next
Generation Internet of Things (NGIoT) networks which may result in catastrophic …

Reinforcement learning based PHY authentication for VANETs

X Lu, L Xiao, T Xu, Y Zhao, Y Tang… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Mobile edge computing in vehicular ad hoc networks (VANETs) suffers from rogue edge
attacks due to the vehicle mobility and the network scale. In this paper, we present a …

Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics

M Mahbub - Journal of Network and Computer Applications, 2020 - Elsevier
The IoT is the upcoming one of the major networking technologies. Using the IoT, different
items or devices can be allowed to continuously generate, obtain, and exchange …

Threshold-free physical layer authentication based on machine learning for industrial wireless CPS

F Pan, Z Pang, H Wen, M Luvisotto… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Wireless industrial cyber-physical systems are increasingly popular in critical manufacturing
processes. These kinds of systems, besides high performance, require strong security and …

A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions

M Ozkan-Ozay, E Akin, Ö Aslan, S Kosunalp… - IEEE …, 2024 - ieeexplore.ieee.org
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …

Physical-layer authentication based on extreme learning machine

N Wang, T Jiang, S Lv, L Xiao - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
Most physical-layer authentication techniques use hypothesis tests to compare the radio
channel information with the channel record of Alice to detect spoofer Eve in wireless …

A multi-layer security scheme for mitigating smart grid vulnerability against faults and cyber-attacks

J Chen, MA Mohamed, U Dampage, M Rezaei… - Applied Sciences, 2021 - mdpi.com
To comply with electric power grid automation strategies, new cyber-security protocols and
protection are required. What we now experience is a new type of protection against new …

Physical-layer security for industrial wireless control systems: Basics and future directions

F Pan, Z Pang, M Luvisotto, M Xiao… - IEEE Industrial …, 2018 - ieeexplore.ieee.org
Wireless networks for industrial control systems are promising because of their reduced cost,
flexible structure, and improved long-term reliability. However, wireless control systems are …