Internet of Things (IoT) security with blockchain technology: A state-of-the-art review

AA Khan, AA Laghari, ZA Shaikh… - IEEE …, 2022 - ieeexplore.ieee.org
With the rapid enhancement in the design and development of the Internet of Things creates
a new research interest in the adaptation in industrial domains. It is due to the impact of …

A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

Compatible Authentication and Key Agreement Protocol for Low Power and Lossy Network in Iot Environment.

A Peivandizadeh, B Molavi - Available at SSRN 4454407, 2023 - papers.ssrn.com
Abstract Today, the Internet of Things can be described as the fastest-growing network that
offers applications in a wide range of applications. This breadth has led to a wide range of …

[HTML][HTML] Security of Internet of Things (IoT) using federated learning and deep learning-Recent advancements, issues and prospects

V Gugueoth, S Safavat, S Shetty - ICT Express, 2023 - Elsevier
There is a great demand for an efficient security framework which can secure IoT systems
from potential adversarial attacks. However, it is challenging to design a suitable security …

Toward secured iot-based smart systems using machine learning

MS Abdalzaher, MM Fouda, HA Elsayed… - IEEE Access, 2023 - ieeexplore.ieee.org
Machine learning (ML) and the internet of things (IoT) are among the most booming
research directions. Smart cities, smart campuses (SCs), smart homes, smart cars, early …

Machine learning benchmarking for secured iot smart systems

MS Abdalzaher, MM Salim, HA Elsayed… - … on Internet of Things …, 2022 - ieeexplore.ieee.org
Smartness and IoT along with machine learning (ML) lead the research directions
nowadays. Smart city, smart campus, smart home, smart vehicle, etc; or if we call it “Smart x” …

Etd: An efficient time delay attack detection framework for uav networks

W Zhai, L Liu, Y Ding, S Sun… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In recent years, Unmanned Aerial Vehicle (UAV) networks are widely used in both military
and civilian scenarios. However, due to the distributed nature, they are also vulnerable to …

A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things

AARA Omar, B Soudan - Internet of Things, 2023 - Elsevier
Abstract The Internet of things (IoT) is a developing technology that has produced
remarkable advancements and contributions in numerous applications. IoT refers to a …

A trust-based model for secure routing against RPL attacks in internet of things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …

Design Guidelines on Trust Management for Underwater Wireless Sensor Networks

R Zhu, A Boukerche, L Long… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
In recent years, significant advancements in wireless underwater communication and
acoustic sensor technology have spurred the exploration and utilization of the ocean's vast …