Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

[PDF][PDF] Hybrid intrusion detection system for internet of things (IoT)

S Smys, A Basar, H Wang - Journal of ISMAC, 2020 - scholar.archive.org
Internet of things (IoT) is a promising solution to connect and access every device through
internet. Every day the device count increases with large diversity in shape, size, usage and …

A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions

S Arisdakessian, OA Wahab, A Mourad… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
In the past several years, the world has witnessed an acute surge in the production and
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …

A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things

SVN Santhosh Kumar, M Selvi… - Computational …, 2023 - Wiley Online Library
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …

BSIS: Blockchain-based secure incentive scheme for energy delivery in vehicular energy network

Y Wang, Z Su, N Zhang - IEEE transactions on industrial …, 2019 - ieeexplore.ieee.org
Vehicular energy network (VEN), as an important part of the Internet of Things for the smart
city, can facilitate the renewable energy (RE) transportation over a large geographical area …

A novel deep learning-based intrusion detection system for IOT networks

A Awajan - Computers, 2023 - mdpi.com
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of
cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and …

An AUV-assisted data gathering scheme based on clustering and matrix completion for smart ocean

M Huang, K Zhang, Z Zeng, T Wang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The oceans cover more than 71% of the Earth's surface and have a surging amount of data.
It is of great significance to seek energy-effective and ultrareliable communication and …

Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain

YM Li, D Wei, L Zhang - Information Sciences, 2021 - Elsevier
The existing watermarking algorithms invariant wavelet domain are weak at resisting
geometric attacks and have small embedding capacities. In this paper, a robust double …

Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks

X Liu, A Liu, T Wang, K Ota, M Dong, Y Liu… - Journal of Parallel and …, 2020 - Elsevier
To improve the data arrival ratio and the transmission delay and considering that the
capacity for determining malicious nodes and energy are limited, a security disjoint routing …