Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey

PLS Jayalaxmi, R Saha, G Kumar, M Conti… - IEEE Access, 2022 - ieeexplore.ieee.org
The increasing number of connected devices in the era of Internet of Thing (IoT) has also
increased the number intrusions. Intrusion Detection System (IDS) is a secondary intelligent …

Blockchain for IoT access control: Recent trends and future research directions

S Pal, A Dorri, R Jurdak - Journal of Network and Computer Applications, 2022 - Elsevier
With the rapid development of wireless sensor networks, smart devices, and traditional
information and communication technologies, there is tremendous growth in the use of …

A survey on IoT-enabled home automation systems: Attacks and defenses

Z Wang, D Liu, Y Sun, X Pang, P Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …

物联网安全研究综述: 威胁, 检测与防御

杨毅宇, 周威, 赵尚儒, 刘聪, 张宇辉, 王鹤… - 通信 …, 2021 - infocomm-journal.com
基于近5 年网安国际会议(ACM CCS, USENIX Security, NDSS, IEEE S&P)
中发表的物联网安全文献, 以及其他部分高水平研究工作, 从威胁, 检测, 防御的视角对物联网 …

Delay wreaks havoc on your smart home: Delay-based automation interference attacks

H Chi, C Fu, Q Zeng, X Du - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices and platforms, it becomes a trend
that IoT devices associated with different IoT platforms coexist in a smart home …

Detecting and Handling {IoT} Interaction Threats in {Multi-Platform}{Multi-Control-Channel} Smart Homes

H Chi, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 23 …, 2023 - usenix.org
A smart home involves a variety of entities, such as IoT devices, automation applications,
humans, voice assistants, and companion apps. These entities interact in the same physical …

Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain

J Wang, W Yi, M Yang, J Ma, S Zhang, S Hao - Journal of Network and …, 2023 - Elsevier
The current IoT platform is vulnerable to remote device hijacking and substitution attacks,
primarily due to weak authentication and authorization mechanisms between IoT devices …

[PDF][PDF] Evasion Attacks and Defenses on Smart Home Physical Event Verification.

MO Ozmen, R Song, H Farrukh, ZB Celik - NDSS, 2023 - researchgate.net
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

Who's in control? On security risks of disjointed IoT device management channels

Y Jia, B Yuan, L Xing, D Zhao, Y Zhang… - Proceedings of the …, 2021 - dl.acm.org
An IoT device today can be managed through different channels, eg, by its device
manufacturer's app, or third-party channels such as Apple's Home app, or a smart speaker …

Access control mechanism for the Internet of Things based on blockchain and inner product encryption

P Han, Z Zhang, S Ji, X Wang, L Liu, Y Ren - Journal of Information Security …, 2023 - Elsevier
The dynamic, massive, and lightweight properties of the Internet of Things device nodes
lead to complicated application environments, and traditional access control mechanisms …