Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories

W Li, S Manickam, P Nanda, AK Al-Ani… - IEEE …, 2024 - ieeexplore.ieee.org
Amid the exponential rise of Internet of Things (IoT) devices, the Message Queue Telemetry
Transport (MQTT) protocol has gained prominence due to its efficiency in facilitating device …

A Novel Multi-Attack IDS Framework for Intelligent Connected Terminals Based on Over-the-Air Signature Updates

B Li, W Hu, X Qu, Y Li - Electronics, 2023 - mdpi.com
Modern terminals are developing toward intelligence and ubiquitous connection. Such ICTs
(intelligent connected terminals) interact more frequently with the outside world and expose …

[PDF][PDF] Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and …

S Ullah, SU Bazai, M Imran, QM Ilyas… - … Materials & Continua, 2024 - cdn.techscience.cn
ABSTRACT Machine-to-machine (M2M) communication plays a fundamental role in
autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial …

Internet Of Things: Sensor Layer Security Risk Mitigation Framework

T Gundu - … Conference on Electrical, Computer and Energy …, 2023 - ieeexplore.ieee.org
The growth of fourth industrial revolution technologies has been driven by the concept of the
Internet of Things (IoT), which encompasses devices ranging from personal gadgets to large …

Automated Smart Home Security System Using Biometric Solution

R Bhardwaj, R Kothiyal… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Security is a process; it's an ongoing endeavor to keep one step ahead of threats and
safeguard what matters most. Security is not a product. Everybody can find shelter in a …