Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

The rise of traffic classification in IoT networks: A survey

H Tahaei, F Afifi, A Asemi, F Zaki, NB Anuar - Journal of Network and …, 2020 - Elsevier
With the proliferation of the Internet of Things (IoT), the integration and communication of
various objects have become a prevalent practice. The huge growth of IoT devices and …

Peek-a-boo: I see your smart home activities, even encrypted!

A Acar, H Fereidooni, T Abera, AK Sikder… - Proceedings of the 13th …, 2020 - dl.acm.org
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment
allow users to easily control the physical world around them and facilitate their living styles …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

Datasets are not enough: Challenges in labeling network traffic

JL Guerra, C Catania, E Veas - Computers & Security, 2022 - Elsevier
In contrast to previous surveys, the present work is not focused on reviewing the datasets
used in the network security field. The fact is that many of the available public labeled …

IoT network traffic classification using machine learning algorithms: An experimental analysis

R Kumar, M Swarnkar, G Singal… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) refers to a wide variety of embedded devices connected to the
Internet, enabling them to transmit and share information in smart environments with each …

Budgeted online selection of candidate IoT clients to participate in federated learning

I Mohammed, S Tabatabai, A Al-Fuqaha… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Machine learning (ML), and deep learning (DL) in particular, play a vital role in providing
smart services to the industry. These techniques, however, suffer from privacy and security …

A survey on IoT profiling, fingerprinting, and identification

M Safi, S Dadkhah, F Shoeleh, H Mahdikhani… - ACM Transactions on …, 2022 - dl.acm.org
The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet
produces several operational and security challenges, such as monitoring, detecting, and …