Hierarchical federated learning based anomaly detection using digital twins for smart healthcare

D Gupta, O Kayode, S Bhatt, M Gupta… - 2021 IEEE 7th …, 2021 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) is becoming ubiquitous with a proliferation of smart
medical devices and applications used in smart hospitals, smart-home based care, and …

Anomaly Detection in Smart Environments: A Comprehensive Survey

D Fährmann, L Martín, L Sánchez, N Damer - IEEE Access, 2024 - ieeexplore.ieee.org
Anomaly detection is a critical task in ensuring the security and safety of infrastructure and
individuals in smart environments. This paper provides a comprehensive analysis of recent …

Delay wreaks havoc on your smart home: Delay-based automation interference attacks

H Chi, C Fu, Q Zeng, X Du - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices and platforms, it becomes a trend
that IoT devices associated with different IoT platforms coexist in a smart home …

Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes

H Chi, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 23 …, 2023 - usenix.org
A smart home involves a variety of entities, such as IoT devices, automation applications,
humans, voice assistants, and companion apps. These entities interact in the same physical …

Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain

J Wang, W Yi, M Yang, J Ma, S Zhang, S Hao - Journal of Network and …, 2023 - Elsevier
The current IoT platform is vulnerable to remote device hijacking and substitution attacks,
primarily due to weak authentication and authorization mechanisms between IoT devices …

[PDF][PDF] Evasion Attacks and Defenses on Smart Home Physical Event Verification.

MO Ozmen, R Song, H Farrukh, ZB Celik - NDSS, 2023 - researchgate.net
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

Detecting anomalous user behavior in remote patient monitoring

D Gupta, M Gupta, S Bhatt… - 2021 IEEE 22nd …, 2021 - ieeexplore.ieee.org
The growth in Remote Patient Monitoring (RPM) services using wearable and non-wearable
Internet of Medical Things (IoMT) promises to improve the quality of diagnosis and facilitate …

Graph learning for interactive threat detection in heterogeneous smart home rule data

G Wang, N Ivanov, B Chen, Q Wang… - Proceedings of the …, 2023 - dl.acm.org
The interactions among automation configuration rule data have led to undesired and
insecure issues in smart homes, which are known as interactive threats. Most existing …

Towards Ubiquitous Semantic Metaverse: Challenges, Approaches, and Opportunities

K Li, BPL Lau, X Yuan, W Ni… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In recent years, ubiquitous semantic Metaverse has been studied to revolutionize immersive
cyber-virtual experiences for augmented reality (AR) and virtual reality (VR) users, which …

{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks

P Rieger, M Chilese, R Mohamed, M Miettinen… - 32nd USENIX Security …, 2023 - usenix.org
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …