Internet of things (IoT) security dataset evolution: Challenges and future directions

B Kaur, S Dadkhah, F Shoeleh, ECP Neto, P Xiong… - Internet of Things, 2023 - Elsevier
The evolution of mobile technologies has introduced smarter and more connected objects
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …

Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

A Attkan, V Ranga - Complex & Intelligent Systems, 2022 - Springer
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …

[HTML][HTML] The digital harms of smart home devices: A systematic literature review

D Buil-Gil, S Kemp, S Kuenzel, L Coventry… - Computers in Human …, 2023 - Elsevier
The connection of home electronic devices to the internet allows remote control of physical
devices and involves the collection of large volumes of data. With the increase in the uptake …

Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms

P Yadav, A Feraudo, B Arief, SF Shahandashti… - Proceedings of the 2nd …, 2020 - dl.acm.org
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be
able to fingerprint them, for example in order to detect if there are misbehaving or even …

Iot phantom-delay attacks: Demystifying and exploiting iot timeout behaviors

C Fu, Q Zeng, H Chi, X Du… - 2022 52nd Annual IEEE …, 2022 - ieeexplore.ieee.org
This paper unveils a set of new attacks against Internet of Things (IoT) automation systems.
We first propose two novel IoT attack primitives: Event Message Delay and Command …

Smart home forensics: An exploratory study on smart plug forensic analysis

A Iqbal, J Olegård, R Ghimire, S Jamshir… - … Conference on Big …, 2020 - ieeexplore.ieee.org
Connectivity as a whole and the Internet of Things (IoT) has influenced a great many things
in the past decade. Among those, the most prominent is our daily life routines, which have …

WYSIWYG: iot device identification based on webui login pages

R Wang, H Li, J Jing, L Jiang, W Dong - Sensors, 2022 - mdpi.com
With the improvement of intelligence and interconnection, Internet of Things (IoT) devices
tend to become more vulnerable and exposed to many threats. Device identification is the …

Through the spyglass: Towards iot companion app man-in-the-middle attacks

TJ OConnor, D Jessee, D Campos - Proceedings of the 14th Cyber …, 2021 - dl.acm.org
The lack of mature development in smart home companion applications complicates Internet
of Things (IoT) security and privacy. Companion applications offer transparency and control …

Towards labeling on-demand iot traffic

D Campos, TJ OConnor - Proceedings of the 14th Cyber Security …, 2021 - dl.acm.org
A lack of transparency has accompanied the rapid proliferation of Internet of Things (IoT)
devices. To this end, a growing body of work exists to classify IoT device traffic to identify …

Towards Examining The Security Cost of Inexpensive Smart Home IoT Devices

TJ OConnor, D Jessee… - 2023 IEEE 47th Annual …, 2023 - ieeexplore.ieee.org
A myriad of security challenges has accompanied the rapid proliferation of internet-of-things
(IoT) smart-home devices. While smart-home security cameras, locks, digital speakers, and …