Internet of things (IoT) security dataset evolution: Challenges and future directions

B Kaur, S Dadkhah, F Shoeleh, ECP Neto, P Xiong… - Internet of Things, 2023 - Elsevier
The evolution of mobile technologies has introduced smarter and more connected objects
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …

A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

Distributed denial of service attacks and its defenses in IoT: a survey

MM Salim, S Rathore, JH Park - The Journal of Supercomputing, 2020 - Springer
A distributed denial of service (DDoS) attack is an attempt to partially or completely shut
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …

Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes

A Sharma, ES Pilli, AP Mazumdar, P Gera - Computer Communications, 2020 - Elsevier
Advancement in technology with the proliferation of new wireless communication protocols
gave rise to the new era of ubiquitous computing, called Internet of Things (IoT). IoT …

Edge-computing-based trustworthy data collection model in the internet of things

T Wang, L Qiu, AK Sangaiah, A Liu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
It is generally accepted that the edge computing paradigm is regarded as capable of
satisfying the resource requirements for the emerging mobile applications such as the …

A comprehensive review of the state-of-the-art on security and privacy issues in healthcare

A López Martínez, M Gil Pérez… - ACM Computing …, 2023 - dl.acm.org
Currently, healthcare is critical environment in our society, which attracts attention to
malicious activities and has caused an important number of damaging attacks. In parallel …

A taxonomy of machine-learning-based intrusion detection systems for the internet of things: A survey

A Jamalipour, S Murali - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology that has earned a lot of research
attention and technical revolution in recent years. Significantly, IoT connects and integrates …

A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

AI-based wormhole attack detection techniques in wireless sensor networks

M Hanif, H Ashraf, Z Jalil, NZ Jhanjhi, M Humayun… - Electronics, 2022 - mdpi.com
The popularity of wireless sensor networks for establishing different communication systems
is increasing daily. A wireless network consists of sensors prone to various security threats …

A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST

K Prathapchandran, T Janani - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) plays a vital role in many application domains like
battlefield surveillance, wildlife monitoring, disaster response, medical care, transportation …