[HTML][HTML] IoT: Communication protocols and security threats

A Gerodimos, L Maglaras, MA Ferrag, N Ayres… - Internet of Things and …, 2023 - Elsevier
In this study, we review the fundamentals of IoT architecture and we thoroughly present the
communication protocols that have been invented especially for IoT technology. Moreover …

Analysis of IoT security challenges and its solutions using artificial intelligence

T Mazhar, DB Talpur, TA Shloul, YY Ghadi, I Haq… - Brain Sciences, 2023 - mdpi.com
The Internet of Things (IoT) is a well-known technology that has a significant impact on many
areas, including connections, work, healthcare, and the economy. IoT has the potential to …

A blockchain-enabled privacy-preserving authentication management protocol for Internet of Medical Things

J Miao, Z Wang, Z Wu, X Ning, P Tiwari - Expert Systems with Applications, 2024 - Elsevier
Over the last decade, with the increasing popularity and usage of the internet of things
worldwide, Internet of Medical Things (IoMT) has emerged as a key technology of the …

Internet of intelligent things (IoT)–An overview

R Salama, F Al-Turjman, M Aeri… - … and Networking (CICTN …, 2023 - ieeexplore.ieee.org
The basic goal of the IoT is to permit the online connection and communication of everyday
physical objects like appliances, vehicles, and other gadgets. This paves the way for …

Security and internet of things: benefits, challenges, and future perspectives

H Taherdoost - Electronics, 2023 - mdpi.com
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate
their efforts on system security. Any vulnerability could lead to a system failure or …

Internet of nano-things (iont): A comprehensive review from architecture to security and privacy challenges

A Alabdulatif, NN Thilakarathne, ZK Lawal, KE Fahim… - Sensors, 2023 - mdpi.com
Throughout the course of human history, owing to innovations that shape the future of
mankind, many technologies have been innovated and used towards making people's lives …

Blockchain-assisted authenticated key agreement scheme for IoT-based healthcare system

A Tomar, N Gupta, D Rani, S Tripathi - Internet of Things, 2023 - Elsevier
IoT devices are widely used in smart hospitals, digital health, and automated pathology
laboratories to generate a large amount of heterogeneous data. These devices, coupled …

Sybil in the haystack: A comprehensive review of blockchain consensus mechanisms in search of strong Sybil attack resistance

M Platt, P McBurney - Algorithms, 2023 - mdpi.com
Consensus algorithms are applied in the context of distributed computer systems to improve
their fault tolerance. The explosive development of distributed ledger technology following …

Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review

H Kheddar, Y Himeur, AI Awad - Journal of Network and Computer …, 2023 - Elsevier
Globally, the external internet is increasingly being connected to industrial control systems.
As a result, there is an immediate need to protect these networks from a variety of threats …

A new concatenated multigraph neural network for iot intrusion detection

T Altaf, X Wang, W Ni, G Yu, RP Liu, R Braun - Internet of Things, 2023 - Elsevier
The last few years have seen a high volume of sophisticated cyber-attacks leading to
financial instability and privacy breaches. This reveals the need for a Network Intrusion …