Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges

I Yaqoob, IAT Hashem, A Ahmed, SMA Kazmi… - Future Generation …, 2019 - Elsevier
The explosive growth of smart objects and their dependency on wireless technologies for
communication increases the vulnerability of Internet of Things (IoT) to cyberattacks …

Utilizing blockchain to overcome cyber security concerns in the internet of things: A review

B Alotaibi - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is a wide network consisting of Internet-connected objects using
installed software, such as home appliances, vehicles, and other entities embedded with …

IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …

Ad-iot: Anomaly detection of iot cyberattacks in smart city using machine learning

I Alrashdi, A Alqazzaz, E Aloufi… - 2019 IEEE 9th …, 2019 - ieeexplore.ieee.org
In recent years, the wide adoption of the modern Internet of Things (IoT) paradigm has led to
the invention of smart cities. Smart cities operate in real-world time to promote ease and …

Technical issues on cognitive radio-based Internet of Things systems: A survey

FA Awin, YM Alginahi, E Abdel-Raheem, K Tepe - IEEE access, 2019 - ieeexplore.ieee.org
Cognitive radio (CR)-based Internet of Things (IoT) system is an effective step toward a
world of smart technology. Many frameworks have been proposed to build CR-based IoT …

Forensics and deep learning mechanisms for botnets in internet of things: A survey of challenges and solutions

N Koroniotis, N Moustafa, E Sitnikova - IEEE Access, 2019 - ieeexplore.ieee.org
The constant miniaturization of hardware and an increase in power efficiency, have made
possible the integration of intelligence into ordinary devices. This trend of augmenting so …

Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications

N Alassaf, A Gutub, SA Parah, M Al Ghamdi - Multimedia Tools and …, 2019 - Springer
Multimedia communication is revolutionizing all major spheres of human life. The advent of
IoT and its applications in many fields like sensing, healthcare and industry, result …

Towards secure 5G networks: A Survey

S Zhang, Y Wang, W Zhou - Computer Networks, 2019 - Elsevier
To support various new use cases from vertical industries besides enhanced mobile
broadband communication services, the 5G system aims to provide higher speed, lower …

Verification and validation techniques for streaming big data analytics in internet of things environment

A Kumari, S Tanwar, S Tyagi, N Kumar - IET Networks, 2019 - Wiley Online Library
With an exponential growth of raw data generated from different sensors, actuators, and
mobile devices, data analytics is becoming a challenging issue keeping in view of the …

A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)

MD Alshehri, FK Hussain - Computing, 2019 - Springer
Recently, the Internet of things (IoT) has received a lot of attention from both industry and
academia. A reliable and secure IoT connection and communication is essential for the …