LightningStrike: (in) secure practices of E-IoT systems in the wild

LP Rondon, L Babun, A Aris, K Akkaya… - Proceedings of the 14th …, 2021 - dl.acm.org
The widespread adoption of specialty smart ecosystems has changed the everyday lives of
users. As a part of smart ecosystems, Enterprise Internet of Things (E-IoT) allows users to …

LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses

L Puche Rondon, L Babun, A Aris, K Akkaya… - … Threats: Research and …, 2023 - dl.acm.org
Enterprise Internet of Things (E-IoT) systems allow users to control audio, video, scheduled
events, lightning fixtures, door access, and relays in complex smart installations. These …

PoisonIvy: (In) secure Practices of Enterprise IoT Systems in Smart Buildings

LP Rondon, L Babun, A Aris, K Akkaya… - Proceedings of the 7th …, 2020 - dl.acm.org
The rise of IoT devices has led to the proliferation of smart buildings, offices, and homes
worldwide. Although commodity IoT devices are employed by ordinary end-users, complex …

Ivycide: Smart Intrusion Detection System Against E-IoT Driver Threats

LP Rondon, L Babun, A Aris, K Akkaya… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The rise of Internet of Things (IoT) devices has led to the proliferation of smart environments
worldwide. Although commodity IoT devices are employed by ordinary end users, complex …

Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities

A Patel, D Patel, R Kakkar, P Oza, S Agrawal… - Security and …, 2024 - Wiley Online Library
With the advancement of innovative technologies, the Internet of Things (IoT) has become
quite popular in various applications such as smart homes, smart cities, agriculture …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …

[HTML][HTML] Securing small-business and home internet of things (iot) devices

D Dodson, T Polk, M Souppaya, WC Barker, P Grayeli… - 2019 - nccoe.nist.gov
The rapid growth of IoT devices has the potential to provide many benefits. It is also a cause
for concern because IoT devices are tempting targets for attackers. State-of-the-art security …

[HTML][HTML] IoT: Communication protocols and security threats

A Gerodimos, L Maglaras, MA Ferrag, N Ayres… - Internet of Things and …, 2023 - Elsevier
In this study, we review the fundamentals of IoT architecture and we thoroughly present the
communication protocols that have been invented especially for IoT technology. Moreover …

Analysis of IoT Vulnerabilities and Proposed Solution Approach for Secure Real-Time IoT Communication

A Girma, N Safa, A Searcy - International Conference on Information …, 2024 - Springer
The growing reliance on real-time communication in Internet of Things (IoT) devices raises
concerns about security vulnerabilities. Our research identifies vulnerabilities in prevalent …