A survey of Internet of Things communication using ICN: A use case perspective

B Nour, K Sharif, F Li, S Biswas, H Moungla… - Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) has gained extensive attention from industry and academia
alike in past decade. The connectivity of each and every piece of technology in the …

[HTML][HTML] Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT

M Aslam, D Ye, A Tariq, M Asad, M Hanif, D Ndzi… - Sensors, 2022 - mdpi.com
The development of smart network infrastructure of the Internet of Things (IoT) faces the
immense threat of sophisticated Distributed Denial-of-Services (DDoS) security attacks. The …

A review on lightweight cryptography for Internet-of-Things based applications

V Rao, KV Prema - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Abstract The Internet-of-Things (IoT) is a combination of an intelligent infrastructure
combined with various self-organizing devices. These devices are used to monitor the …

Dependency-aware task scheduling in vehicular edge computing

Y Liu, S Wang, Q Zhao, S Du, A Zhou… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Vehicular edge computing (VEC) offers a new paradigm to improve vehicular services and
augment the capabilities of vehicles. In this article, we study the problem of task scheduling …

[HTML][HTML] Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: An experimental approach

J Galeano-Brajones, J Carmona-Murillo… - Sensors, 2020 - mdpi.com
The expected advent of the Internet of Things (IoT) has triggered a large demand of
embedded devices, which envisions the autonomous interaction of sensors and actuators …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …

ML-DDoS: A blockchain-based multilevel DDoS mitigation mechanism for IoT environments

RF Hayat, S Aurangzeb, M Aleem… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks as well as botnet-based attacks are among the
most important security vulnerabilities in Internet of Things (IoT) environments. Most of the …

An AUV-assisted data gathering scheme based on clustering and matrix completion for smart ocean

M Huang, K Zhang, Z Zeng, T Wang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The oceans cover more than 71% of the Earth's surface and have a surging amount of data.
It is of great significance to seek energy-effective and ultrareliable communication and …

Dependency-aware task offloading and service caching in vehicular edge computing

Q Shen, BJ Hu, E Xia - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
With the emergence of computation-intensive vehicular applications, vehicular edge
computing (VEC) offers a new paradigm to augment the capabilities of vehicles. In this …

Load-balanced and QoS-aware software-defined Internet of Things

A Montazerolghaem… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) offers a variety of solutions to control industrial environments. The
new generation of IoT consists of millions of machines generating huge traffic volumes; this …