AI-empowered IoT security for smart cities

Z Lv, L Qiao, A Kumar Singh, Q Wang - ACM Transactions on Internet …, 2021 - dl.acm.org
Smart cities fully utilize the new generation of Internet of Things (IoT) technology in the
process of urban informatization to optimize the urban management and service. However …

A survey on recent advanced research of CPS security

Z Wang, W Xie, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate
computing, communication, and control. Malicious attacks on CPSs can lead to both …

[PDF][PDF] A comprehensive survey on resource management in internet of things

LB Bhajantri - Journal of Telecommunications and Information …, 2020 - bibliotekanauki.pl
Efficient resource management is a challenging task in distributed systems, such as the
Internet of Things, fog, edge, and cloud computing. In this work, we present a broad …

NB-IoT security: A survey

V Kumar, RK Jha, S Jain - Wireless Personal Communications, 2020 - Springer
In the past few years, the term Internet of Things (IoT) has become very prevalent. In IoT,
aggregation of data (from sensors) to processing the data (to the cloud) is energy constraint …

LP-SBA-XACML: Lightweight semantics based scheme enabling intelligent behavior-aware privacy for IoT

M Chehab, A Mourad - IEEE Transactions on Dependable and …, 2020 - ieeexplore.ieee.org
The broad applicability of Internet of Things (IoT) would truly enable the pervasiveness of
smart devices for sensing data. In this context, achieving service personalization requires …

Proactive defense for internet-of-things: moving target defense with cyberdeception

M Ge, JH Cho, D Kim, G Dixit, IR Chen - ACM Transactions on Internet …, 2021 - dl.acm.org
Resource constrained Internet-of-Things (IoT) devices are highly likely to be compromised
by attackers, because strong security protections may not be suitable to be deployed. This …

Toward the design of an efficient and secure system based on the software-defined network paradigm for vehicular networks

B Alaya, L Sellami - IEEE Access, 2023 - ieeexplore.ieee.org
The advent of Intelligent Transport Systems (ITS) has led to the appearance of vehicles
increasingly connected to their environment on global road networks. Due to the strict …

Kalis2. 0-a SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for the IoT

A Rullo, D Midi, A Mudjerikar… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The wide variety of application domains makes the Internet of Things (IoT) quite unique
among other types of computer networks: IoT networks can be made of devices of different …

Pareto-optimal defenses for the web infrastructure: Theory and practice

G Di Tizio, P Speicher, M Simeonovski… - ACM Transactions on …, 2023 - dl.acm.org
The integrity of the content a user is exposed to when browsing the web relies on a plethora
of non-web technologies and an infrastructure of interdependent hosts, communication …

Optimal defense resource allocation for attacks in wireless sensor networks based on risk assessment model

YJ Deng, YQ Li, YH Qin, MR Dong, B Liu - Chaos, Solitons & Fractals, 2020 - Elsevier
To solve the unreasonable allocation problem of network security defense resource, this
paper presents a framework for optimal defense resource allocation for minimizing the …