Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects

S Lakshminarayana, A Praseed… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most promising new millennial technologies, having
numerous applications in our surrounding environment. The fundamental goal of an IoT …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

A systematic review of applying grey wolf optimizer, its variants, and its developments in different Internet of Things applications

MH Nadimi-Shahraki, H Zamani, ZA Varzaneh… - Internet of Things, 2024 - Elsevier
Abstract The Internet of Things (IoT) shapes an organization of objects that can interface and
share information with different devices using sensors, computer programs, and other …

Imaging privacy threats from an ambient light sensor

Y Liu, GW Wornell, WT Freeman, F Durand - Science Advances, 2024 - science.org
Embedded sensors in smart devices pose privacy risks, often unintentionally leaking user
information. We investigate how combining an ambient light sensor with a device display …

Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities

A Patel, D Patel, R Kakkar, P Oza, S Agrawal… - Security and …, 2024 - Wiley Online Library
With the advancement of innovative technologies, the Internet of Things (IoT) has become
quite popular in various applications such as smart homes, smart cities, agriculture …

Internet of Things (IoT) of Smart Homes: Privacy and Security

T Magara, Y Zhou - Journal of Electrical and Computer …, 2024 - Wiley Online Library
The Internet of Things (IoT) constitutes a sophisticated network that interconnects devices,
optimizing functionality across various domains of human activity. Recent literature …

[HTML][HTML] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …

LuxTrack: activity inference attacks via smartphone ambient light sensors and countermeasures

S Seyedkazemi, ME Gursoy… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Ambient Light Sensors (ALS) are integrated into mobile devices to enable various
functionalities such as automatic adjustment of screen brightness and background color …

[HTML][HTML] A survey of acoustic eavesdropping attacks: Principle, methods, and progress

Y Chen, W Li, XZ Cheng, P Hu - High-Confidence Computing, 2024 - Elsevier
In today's information age, eavesdropping has been one of the most serious privacy threats
in information security, such as exodus spyware (Rudie et al., 2021) and pegasus spyware …

Analyzing the attack surface and threats of industrial Internet of Things devices

S Liebl, L Lathrop, U Raithel, A Aßmuth… - arXiv preprint arXiv …, 2024 - arxiv.org
The growing connectivity of industrial devices as a result of the Internet of Things is
increasing the risks to Industrial Control Systems. Since attacks on such devices can also …