Internet of Things (IoT) systems are becoming more common and present in our daily lives. The increase of Internet-connected devices has caused attackers to focus their attention …
Z Luo, W Wang, J Qu, T Jiang, Q Zhang - … of the 16th ACM conference on …, 2018 - dl.acm.org
The lightweight protocols and low-power radio technologies open up many opportunities to facilitate Internet-of-Things (IoT) into our daily life, while their minimalist design also makes …
A Hariri, N Giannelos, B Arief - … City, Luxembourg, September 26–27, 2019 …, 2020 - Springer
Efforts have been made to improve the security of the Internet of Things (IoT) devices, but there remain some vulnerabilities and misimplementations. This paper describes a new …
D Yang, A Kumar, S Ray, W Wang… - 2023 32nd International …, 2023 - ieeexplore.ieee.org
Security issues have become one of the major challenges for Internet-of-Things (IoT) networks. To overcome this challenge, the recent commonly-used approaches mainly focus …
Authentication protocols are powerful tools to ensure confidentiality as an important feature of Internet of Things (IoT). The Denial-of-Service (DoS) attack is one of the significant threats …
M Aziz Al Kabir, W Elmedany… - Journal of Cyber Security …, 2023 - Taylor & Francis
The increasing prevalence of IoT devices has brought about numerous security challenges due to their relatively simple internal architecture and low-powered hardware warranted by …
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of wireless and wired networks, geographically distributed and interconnected by a “secured” …
E James, F Rabbi - Tensorgate Journal of Sustainable …, 2023 - research.tensorgate.org
The proliferation of Internet of Things (IoT) devices in our connected world has brought unparalleled convenience and efficiency to various sectors, ranging from smart homes to …
With the recent exponential increase in network-based devices, it is expected that billions of devices will be connected to the Internet. In enabling this growth, effectively securing Internet …