Connecting the Dots: Tracing Data Endpoints in IoT Devices

M Jakaria, DY Huang, A Das - Proceedings on Privacy …, 2024 - petsymposium.org
Smart home devices are constantly exchanging data with a variety of remote endpoints. This
data encompasses diverse information, from device operation and status to sensitive user …

Security issues and architecture of iot

K Jha, S Anumotu, K Soni - 2021 International conference on …, 2021 - ieeexplore.ieee.org
Internet of Things or IOT is known abundantly. It is rapidly growing in various fields like
business, education, healthcare, smart home, etc. It has enabled billions of devices to get …

Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach

ED Alalade, M Mahyoub, A Matrawy - arXiv preprint arXiv:2401.09519, 2024 - arxiv.org
Addressing trust concerns in Smart Home (SH) systems is imperative due to the limited study
on preservation approaches that focus on analyzing and evaluating privacy threats for …

[PDF][PDF] Internet of things (iot) security: Status, challenges and countermeasures

NN Thilakarathne, R Samarasinghe… - … Journal of Advanced …, 2022 - researchgate.net
-------------------------------------------------------------------ABSTRACT-------------------------------------------
--------------------The Internet of Things (IoT) is a vast concept spreading rapidly throughout the …

A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data

N Naz, MA Khan, MA Khan, MA Khan, SU Jan… - … Conference of Advanced …, 2022 - Springer
Abstract The Internet of Things (IoT) is a grid of interconnected pre-programmed electronic
devices to provide intelligent services for daily life tasks. However, the security of such …

Balancing Ubiquitous Computing: Addressing Ethical, Privacy, and Cybersecurity Challenges for Responsible and Secure Implementation in Malaysia

K Rajagopal, M Abdulnabi… - 2023 IEEE 21st Student …, 2023 - ieeexplore.ieee.org
Ubiquitous computing, integrating technology seamlessly into daily life, holds immense
potential for Malaysia's digital transformation. This paper explores the ethical, privacy, and …

[HTML][HTML] Secure medical sensor monitoring framework using novel hybrid encryption algorithm driven by internet of things

MN Jeyakumar, J Samraj - Measurement: Sensors, 2024 - Elsevier
Abstract The Internet of Things (IoT) makes intelligent identification and management
possible by enabling all items to connect to the Internet and exchange data through various …

An Analysis of Security Attacks on IoT Applications

K Alkhamisi - International Journal of Information Systems and …, 2023 - journals.cfrit.com
Abstract The Internet of Things (IoT) has emerged as an innovation equipped for interfacing
heterogeneous objects, like individuals, gadgets, and foundation, and simplifying our day-to …

[PDF][PDF] IoT Security: Overview, Challenges and Countermeasures

NN Thilakarathne… - Conference: Annual …, 2022 - researchgate.net
The Internet of Things (IoT) is a vast concept that is spreading rapidly throughout the world
today. IoT devices are more vulnerable to cyberattacks than other endpoint devices, such as …

[PDF][PDF] Security and QoS (Quality of Service) Related Current Challenges in IoT

S Pawar, M Lokhande, S Thite, J AP, R Samant… - … International Journal of … - researchgate.net
IoT technologies have permitted the linking of devices all around the globe through the
Internet. Because of their capacity to send, receive, and analyze data, the gadgets are …