Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things

B Ghimire, DB Rawat - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Decentralized paradigm in the field of cybersecurity and machine learning (ML) for the
emerging Internet of Things (IoT) has gained a lot of attention from the government …

Securing real-time internet-of-things

CY Chen, M Hasan, S Mohan - Sensors, 2018 - mdpi.com
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …

Distributed energy resources cybersecurity outlook: Vulnerabilities, attacks, impacts, and mitigations

I Zografopoulos, ND Hatziargyriou… - IEEE Systems …, 2023 - ieeexplore.ieee.org
The digitization and decentralization of the electric power grid are key thrusts for an
economically and environmentally sustainable future. Toward this goal, distributed energy …

Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models

Z Bakhshi, A Balador, J Mustafa - 2018 IEEE wireless …, 2018 - ieeexplore.ieee.org
This paper investigates security concerns and issues for Industrial Internet of Things (IIoT).
The IIoT is an emerging transformation, bringing great values to every industry. Although this …

Tailoring onion routing to the internet of things: Security and privacy in untrusted environments

J Hiller, J Pennekamp, M Dahlmanns… - 2019 IEEE 27th …, 2019 - ieeexplore.ieee.org
An increasing number of IoT scenarios involve mobile, resource-constrained IoT devices
that rely on untrusted networks for Internet connectivity. In such environments, attackers can …

IoTCop: A blockchain-based monitoring framework for detection and isolation of malicious devices in Internet-of-Things systems

SS Seshadri, D Rodriguez, M Subedi… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Unlike conventional servers housed in a centralized and secured indoor environment (eg,
data centers), Internet-of-Things (IoT) devices such as sensor/actuator are geographically …

Mitigating Mirai malware spreading in IoT environment

TS Gopal, M Meerolla, G Jyostna… - … on Advances in …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) allows humans and everyday physical objects to interact and
facilitates information sharing. Limited computational & memory capabilities, heterogeneous …

A layered taxonomy of internet of things attacks

F Azzedin, I Alhejri - Proceedings of the 6th International Conference on …, 2022 - dl.acm.org
Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny
wearable devices to large industrial systems. However, ensuring the security of IoT systems …

RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey

A Gupta, A Anpalagan, GHS Carvalho, AS Khwaja… - 2019 - Elsevier
Three missing references should have been added throughout the manuscript [145] S. Yasir;
C. Noel; RM Husain, C. Rebecca,“Open Access Internet of Things-aided Smart Grid …

[PDF][PDF] Comparative analysis on virtual private network in the internet of things gateways

MI Zakaria, MN Norizan, MM Isa… - Indones. J. Electr …, 2022 - researchgate.net
A virtual private network (VPN) connects a private network to the internet, primarily the public
network, through a secure tunnel. Using a local area network (LAN) segment, users can …