Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities

A Patel, D Patel, R Kakkar, P Oza, S Agrawal… - Security and …, 2024 - Wiley Online Library
With the advancement of innovative technologies, the Internet of Things (IoT) has become
quite popular in various applications such as smart homes, smart cities, agriculture …

Characterizing sensor leaks in android apps

X Sun, X Chen, K Liu, S Wen, L Li… - 2021 IEEE 32nd …, 2021 - ieeexplore.ieee.org
While extremely valuable to achieve advanced functions, mobile phone sensors can be
abused by attackers to implement malicious activities in Android apps, as experimentally …

Healthcare monitoring system for automatic database management using mobile application in IoT environment

S Saleh, B Cherradi, O El Gannour, N Gouiza… - Bulletin of Electrical …, 2023 - beei.org
In the last decade, healthcare systems have played an effective role in improving medical
services by monitoring and diagnosing patients' health remotely. These systems, either in …

Hey kimya, is my smart speaker spying on me? taking control of sensor privacy through isolation and amnesia

P De Vaere, A Perrig - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Although smart speakers and other voice assistants are becoming increasingly ubiquitous,
their always-standby nature continues to prompt significant privacy concerns. To address …

False data injection attacks in internet of things and deep learning enabled predictive analytics

GR Mode, P Calyam, KA Hoque - arXiv preprint arXiv:1910.01716, 2019 - arxiv.org
Industry 4.0 is the latest industrial revolution primarily merging automation with advanced
manufacturing to reduce direct human effort and resources. Predictive maintenance (PdM) is …

Integrating IoT monitoring for security operation center

D Weissman, A Jayasumana - 2020 Global Internet of Things …, 2020 - ieeexplore.ieee.org
A Security Operation Center (SOC) performs critical functions in alerting and taking
defensive actions for computer security. As network infrastructures evolve with broader …

[PDF][PDF] A Proposed Architecture for Pharmaceutical Supply Chain Based Semantic Blockchain.

S Ouf - International Journal of Intelligent Engineering & …, 2021 - inass.org
This paper introduces an architecture to improve the pharmaceutical supply chain's security
by using the Internet of Things, semantic web, and blockchain. This architecture increases …

A Systematic Review of Applying Grey Wolf Optimizer, its Variants, and its Developments in Different Internet of Things Applications

MH Nadimi-Shahraki, H Zamani, ZA Varzaneh… - Internet of Things, 2024 - Elsevier
Abstract The Internet of Things (IoT) shapes an organization of objects that can interface and
share information with different devices using sensors, computer programs, and other …

Unleashing iot security: Assessing the effectiveness of best practices in protecting against threats

P Pütz, R Mitev, M Miettinen, AR Sadeghi - Proceedings of the 39th …, 2023 - dl.acm.org
The Internet of Things (IoT) market is rapidly growing and is expected to double from 2020 to
2025. The increasing use of IoT devices, particularly in smart homes, raises crucial concerns …

Sentinel: A robust intrusion detection system for IoT networks using kernel-level system information

A Cosson, AK Sikder, L Babun, ZB Celik… - Proceedings of the …, 2021 - dl.acm.org
The concept of Internet of Things (IoT) has changed the way we live by integrating
commodity devices with cyberspace to automate our everyday tasks. Nowadays, IoT devices …