Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

[HTML][HTML] Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

[HTML][HTML] A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …

A survey on software-defined wireless sensor networks: Challenges and design requirements

HI Kobo, AM Abu-Mahfouz, GP Hancke - IEEE access, 2017 - ieeexplore.ieee.org
Software defined networking (SDN) brings about innovation, simplicity in network
management, and configuration in network computing. Traditional networks often lack the …

Security in Internet of Things: issues, challenges, taxonomy, and architecture

V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
Internet technology is very pervasive today. The number of devices connected to the
Internet, those with a digital identity, is increasing day by day. With the developments in the …

Machine learning-based intrusion detection for smart grid computing: A survey

N Sahani, R Zhu, JH Cho, CC Liu - ACM Transactions on Cyber-Physical …, 2023 - dl.acm.org
Machine learning (ML)-based intrusion detection system (IDS) approaches have been
significantly applied and advanced the state-of-the-art system security and defense …

[HTML][HTML] A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Computer Networks, 2020 - Elsevier
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …

[HTML][HTML] Supply chain 4.0: A survey of cyber security challenges, solutions and future directions

T Sobb, B Turnbull, N Moustafa - Electronics, 2020 - mdpi.com
Supply chain 4.0 denotes the fourth revolution of supply chain management systems,
integrating manufacturing operations with telecommunication and Information Technology …

The state-of-the-art wireless body area sensor networks: A survey

RA Khan, ASK Pathan - International Journal of Distributed …, 2018 - journals.sagepub.com
Wireless body area sensor network is a sub-field of wireless sensor network. Wireless body
area sensor network has come into existence after the development of wireless sensor …

[HTML][HTML] Security and privacy management in Internet of Medical Things (IoMT): a synthesis

R Hireche, H Mansouri, ASK Pathan - Journal of Cybersecurity and …, 2022 - mdpi.com
The Internet of Medical Things (IoMT) has become a strategic priority for future e-healthcare
because of its ability to improve patient care and its scope of providing more reliable clinical …