A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions

W Fei, H Ohno, S Sampalli - ACM Computing Surveys, 2023 - dl.acm.org
The Internet of Things (IoT) encompasses a network of physical objects embedded with
sensors, software, and data processing technologies that can establish connections and …

COVID-19: Secure healthcare Internet of Things networks, current trends and challenges with future research directions

M Adil, J Ali, MM Jadoon, SR Alotaibi, N Kumar… - ACM Transactions on …, 2023 - dl.acm.org
The number of affirmed COVID-19 cases showed an enormous increase in the recent past
throughout the globe. Keeping in view the catastrophic destruction of this devastating virus …

Intrusion detection based on machine learning in the internet of things, attacks and counter measures

E Rehman, M Haseeb-ud-Din, AJ Malik… - The Journal of …, 2022 - Springer
Globally, data security and privacy over the Internet of Things (IoT) are necessary due to its
emergence in daily life. As the IoT will soon invade each part of our lives, attention to IoT …

Research on IoT forensics system based on blockchain technology

G Liang, J Xin, Q Wang, X Ni… - Security and …, 2022 - Wiley Online Library
In recent years, mobile edge computing (MEC) has become a research hotspot in academia.
The Internet of Things (IoT) is an excellent way to build the infrastructure required for a MEC …

[HTML][HTML] A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges

T Sasi, AH Lashkari, R Lu, P Xiong, S Iqbal - Journal of Information and …, 2023 - Elsevier
Abstract The Internet of Things (IoT) has set the way for the continuing digitalization of
society in various manners during the past decade. The IoT is a vast network of intelligent …

A survey of using machine learning in IoT security and the challenges faced by researchers

KM Harahsheh, CH Chen - Informatica, 2023 - digitalcommons.odu.edu
Abstract The Internet of Things (IoT) has become more popular in the last 15 years as it has
significantly improved and gained control in multiple fields. We are nowadays surrounded by …

Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes

L Kane, V Liu, M McKague, GR Walker - IEEE Access, 2022 - ieeexplore.ieee.org
The IoT-based smart grid provides many benefits to both energy consumers and energy
producers, such as advanced metering functions, improved reliability, and management …

Recent review of distributed denial of service attacks in the internet of things

H Djuitcheu, M Debes, M Aumüller… - 2022 5th conference on …, 2022 - ieeexplore.ieee.org
The use of the Internet of Things (IoT) in almost all domains nowadays makes it the network
of the future. Due to the high attention since its creation, this network is the target of …

SOAR4IoT: securing IoT assets with digital twins

P Empl, D Schlette, D Zupfer, G Pernul - Proceedings of the 17th …, 2022 - dl.acm.org
As more and more security tools provide organizations with cybersecurity capabilities,
security analysts are overwhelmed by security events. Resolving these events is challenging …

Digital Investigation Forensic Model with P2P Timestamp Blockchain for Monitoring and Analysis.

L Almahadeen, RD Cosme Pecho… - Journal of Electrical …, 2024 - search.ebscohost.com
Forensic analysis of Blockchain data is a new field in police work. It's now one of the largest
problems facing law enforcement. The paper discussed the worldwide need for digital …