Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

IoT goes nuclear: Creating a ZigBee chain reaction

E Ronen, A Shamir, AO Weingarten… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
Within the next few years, billions of IoT devices will densely populate our cities. In this
paper we describe a new type of threat in which adjacent IoT devices will infect each other …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

[HTML][HTML] Lightweight public key infrastructure for the Internet of Things: A systematic literature review

M El-Hajj, P Beune - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract The Internet of Things (IoT) has transformed everyday environments into
interconnected cyber–physical systems, enabling automation and assistance for diverse …

A state-of-the-art review on the security of mainstream IoT wireless PAN protocol stacks

G Kambourakis, C Kolias, D Geneiatakis, G Karopoulos… - Symmetry, 2020 - mdpi.com
Protocol stacks specifically designed for the Internet of Things (IoT) have become
commonplace. At the same time, security and privacy concerns regarding IoT technologies …

Improving CEMA using correlation optimization

P Robyns, P Quax, W Lamotte - IACR Transactions on Cryptographic …, 2019 - tches.iacr.org
Sensitive cryptographic information, eg AES secret keys, can be extracted from the
electromagnetic (EM) leakages unintentionally emitted by a device using techniques such …

Turn on, tune in, listen up: Maximizing side-channel recovery in time-to-digital converters

C Drewes, O Weng, K Ryan, B Hunter… - Proceedings of the …, 2023 - dl.acm.org
Voltage fluctuation sensors measure minute changes in an FPGA power distribution
network, allowing attackers to extract information from concurrently executing computations …

Automated software protection for the masses against side-channel attacks

N Belleville, D Couroussé, K Heydemann… - ACM Transactions on …, 2018 - dl.acm.org
We present an approach and a tool to answer the need for effective, generic, and easily
applicable protections against side-channel attacks. The protection mechanism is based on …