A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities

B Alotaibi - Sensors, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …

A computational trust model for social IoT based on interval neutrosophic numbers

S Pourmohseni, M Ashtiani, AA Azirani - Information Sciences, 2022 - Elsevier
Nowadays, the trend of evolution of connected devices, communication networks, and cloud
services towards the internet of things (IoT) has facilitated the interaction between smart …

Internet of Things-Building Information Modeling Integration: Attacks, Challenges, and Countermeasures

BH Mohammed, H Sallehudin, SA Mohamed… - IEEE …, 2022 - ieeexplore.ieee.org
Fifth-generation (5G) technology is now being established globally and is a central topic of
discussion for future generations. The building sector is at risk because the internet of things …

A Conceptual Framework for Securing IoT-BIM

BH Mohammed, A Husairi, H Sallehudin… - 2022 Applied …, 2022 - ieeexplore.ieee.org
Recently, the Internet of Things and building information modeling (IoT-BIM) has captured
attention because of its wide range of applications in multiple domains communicating …

A novel deep learning-based approach for detecting attacks in social IoT

R Mohan Das, U Arun Kumar, S Gopinath, V Gomathy… - Soft Computing, 2023 - Springer
In the innovative concept of the “Social Internet of Things”(IoT), the IoT is combined with
social platforms so that inanimate devices can form their interactions with one another. Still …

Exploring Trust Modelling and Management Techniques in the Context of Distributed Wireless Networks: A Literature Review

T Lenard, A Collen, M Benyahya, NA Nijdam… - IEEE …, 2023 - ieeexplore.ieee.org
Trust Modelling and Management (TMM) techniques are frequently applied in ad-hoc
Distributed Wireless Networks (DWNs) to stimulate and improve cooperation between …

Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments

A Yu, J Kang, W Jiang, D Lin - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the continuous advancement of sensing, networking, controlling, and computing
technologies, there is a growing number of IoT (Internet of Things) devices emerging that are …

SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract

A Dayyani, M Abbaspour - IET Communications, 2024 - Wiley Online Library
Sybil attacks are a very serious challenge in social networks including, the Social Internet of
Things (SIoT). This paper introduces the SybilPSIoT method, in which a hybrid prevention …

FACT: A Flexible Access Control Technique for Very Large Scale Public IoT Services

A Yu, J Kang, W Jiang, D Lin - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
With the advances in sensing, networking, control-ling, and computing technologies, more
and more IoT (Internet of Things) devices are emerging. They are envisioned to become part …

Malware detection in Social Internet of Things (SIoT) for E-commerce using Machine Learning methods

J Anciline Jenifer - Atomic Spectroscopy-Part C, 2023 - atomicspectroscoopyjournal.com
Abstract The Internet of Things (IoT) plays a key role in each object of the next-generation
people like smartphones, wearable devices as well as actuators and sensors have been …