Edge-computing architectures for internet of things applications: A survey

S Hamdan, M Ayyash, S Almajali - Sensors, 2020 - mdpi.com
The rapid growth of the Internet of Things (IoT) applications and their interference with our
daily life tasks have led to a large number of IoT devices and enormous sizes of IoT …

Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective

G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …

A survey of edge computing-based designs for IoT security

K Sha, TA Yang, W Wei, S Davari - Digital Communications and Networks, 2020 - Elsevier
Pervasive IoT applications enable us to perceive, analyze, control, and optimize the
traditional physical systems. Recently, security breaches in many IoT applications have …

A haystack full of needles: Scalable detection of iot devices in the wild

SJ Saidi, AM Mandalari, R Kolcun, H Haddadi… - Proceedings of the …, 2020 - dl.acm.org
Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich
and diverse functionalities, from voice assistants to home appliances. These functionalities …

Blockchain solutions for forensic evidence preservation in IoT environments

S Brotsis, N Kolokotronis, K Limniotis… - … IEEE Conference on …, 2019 - ieeexplore.ieee.org
The technological evolution brought by the Internet of things (IoT) comes with new forms of
cyber-attacks exploiting the complexity and heterogeneity of IoT networks, as well as, the …

[HTML][HTML] Augmenting Zero Trust Network Architecture to enhance security in virtual power plants

A Alagappan, SK Venkatachary, LJB Andrews - Energy Reports, 2022 - Elsevier
Abstract Zero Trust Network Architecture implementation is gaining popularity in the ICT
sector to defend and deter cyber threats or cyber crime. Considering the architecture's …

Effective multitask deep learning for iot malware detection and identification using behavioral traffic analysis

S Ali, O Abusabha, F Ali, M Imran… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Despite the benefits of the Internet of Things (IoT), the growing influx of IoT-specific malware
coordinating large-scale cyberattacks via infected IoT devices has created a substantial …

ADEPT: Detection and identification of correlated attack stages in IoT networks

KLK Sudheera, DM Divakaran… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The fast-growing Internet-of-Things (IoT) market has opened up a large threat landscape,
given the wide deployment of IoT devices in both consumer and commercial spaces. Attacks …

A feature-ranking framework for IoT device classification

BA Desai, DM Divakaran, I Nevat… - … systems & networks …, 2019 - ieeexplore.ieee.org
IoT market is rapidly changing the cyber threat landscape. The challenges to security and
privacy arise not only because IoT devices are large in number, but also because IoT …

Deep dive into the IoT backend ecosystem

SJ Saidi, S Matic, O Gasser, G Smaragdakis… - Proceedings of the …, 2022 - dl.acm.org
Internet of Things (IoT) devices are becoming increasingly ubiquitous, eg, at home, in
enterprise environments, and in production lines. To support the advanced functionalities of …