A survey on privacy and security of Internet of Things

MM Ogonji, G Okeyo, JM Wafula - Computer Science Review, 2020 - Elsevier
Abstract Internet of Things (IoT) has fundamentally changed the way information technology
and communication environments work, with significant advantages derived from wireless …

Enforcing security in Internet of Things frameworks: A systematic literature review

M Aly, F Khomh, M Haoues, A Quintero, S Yacout - Internet of Things, 2019 - Elsevier
With the rise of the Internet of Things (IoT) technology, the number of IoT devices/sensors
has increased significantly. It is anticipated that large-scale sensor-based systems will …

Security, cybercrime and digital forensics for IoT

HF Atlam, A Alenezi, MO Alassafi, AA Alshdadi… - Principles of internet of …, 2020 - Springer
Abstract The Internet of Things (IoT) connects almost all the environment objects whether
physical or virtual over the Internet to produce new digitized services that improve people's …

A taxonomy of IoT firmware security and principal firmware analysis techniques

I Nadir, H Mahmood, G Asadullah - International Journal of Critical …, 2022 - Elsevier
Abstract Internet of Things (IoT) has come a long way since its inception. However, the
standardization process in IoT systems for a secure IoT solution is still in its early days …

Application of IoT in military operations in a smart city

FT Johnsen, Z Zieliński, K Wrona, N Suri… - 2018 International …, 2018 - ieeexplore.ieee.org
This paper addresses a scenario where a medium sized smart city in an Alliance nation has
been struck by disaster. A small, multi-national force is deployed for disaster relief …

Securing the Internet of Things a military perspective

K Wrona - 2015 IEEE 2nd World Forum on Internet of Things …, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) has the potential to become one of the most disruptive
technologies that have emerged in recent decades. It can influence both civilian and military …

Exploiting smart city IoT for disaster recovery operations

N Suri, Z Zielinski, M Tortonesi, C Fuchs… - 2018 IEEE 4th World …, 2018 - ieeexplore.ieee.org
Disaster recovery operations are extremely challenging and place significant demands on
multiple resources, including local and international emergency response personnel, non …

MEML: Resource-aware MQTT-based machine learning for network attacks detection on IoT edge devices

A Shalaginov, O Semeniuta, M Alazab - Proceedings of the 12th IEEE …, 2019 - dl.acm.org
Growing number of Smart Applications in recent years bring a completely new landscape of
cyber-attacks and exploitation scenario that have not been seen in wild before. Devices in …

Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions

VR Kebande, AI Awad - ACM Computing Surveys, 2024 - dl.acm.org
The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0
revolution, which is projected to continue accelerating and realizing digital transformations …

[HTML][HTML] Privacy Preservation Using Machine Learning in the Internet of Things

S El-Gendy, MS Elsayed, A Jurcut, MA Azer - Mathematics, 2023 - mdpi.com
The internet of things (IoT) has prepared the way for a highly linked world, in which
everything is interconnected, and information exchange has become more easily accessible …