How machine learning changes the nature of cyberattacks on IoT networks: A survey

E Bout, V Loscri, A Gallais - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has continued gaining in popularity and importance in everyday
life in recent years. However, this development does not only present advantages. Indeed …

A survey on continuous authentication methods in Internet of Things environment

FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …

The role of trust in intention to use the IoT in eHealth: Application of the modified UTAUT in a consumer context

WB Arfi, IB Nasr, G Kondrateva, L Hikkerova - … Forecasting and Social …, 2021 - Elsevier
Abstract The Internet of Things (IoT) has emerged over the last few decades in many fields,
and healthcare can significantly benefit from the IoT. This study aims to examine factors …

Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: A survey

S Ali, Q Li, A Yousafzai - Ad Hoc Networks, 2024 - Elsevier
The industrial internet of things (IIoT) is an evolutionary extension of the traditional Internet of
Things (IoT) into processes and machines for applications in the industrial sector. The IIoT …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

DDoS attack detection in Internet of Things using recurrent neural network

O Yousuf, RN Mir - Computers and Electrical Engineering, 2022 - Elsevier
Abstract The Internet of Things (IoT) is an emerging communication paradigm due to its wide
range of applications. For IoT, distributed denial of service (DDoS) attacks are becoming …

Risk assessment methodologies for the internet of medical things: A survey and comparative appraisal

V Malamas, F Chantzis, TK Dasaklis… - IEEE …, 2021 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) has revolutionized health care services by providing
significant benefits in terms of patient well being and relevant costs. Traditional risk …

Intrusion detection based on machine learning in the internet of things, attacks and counter measures

E Rehman, M Haseeb-ud-Din, AJ Malik… - The Journal of …, 2022 - Springer
Globally, data security and privacy over the Internet of Things (IoT) are necessary due to its
emergence in daily life. As the IoT will soon invade each part of our lives, attention to IoT …

Game theory for anti-jamming strategy in multichannel slow fading IoT networks

A Gouissem, K Abualsaud, E Yaacoub… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The open nature of the wireless communication medium renders it vulnerable to jamming
attacks by malicious users. To detect their presence and to avoid such attacks, several …

Iot-enabled secure and scalable cloud architecture for multi-user systems: A hybrid post-quantum cryptographic and blockchain based approach towards a trustworthy …

RR Irshad, S Hussain, I Hussain, JA Nasir, A Zeb… - IEEE …, 2023 - ieeexplore.ieee.org
Cloud computing has revolutionized organizational operations by providing convenient, on-
demand access to resources. The emergence of the Internet of Things (IoT) has introduced a …