Internet of things: Survey on security

D Mendez Mena, I Papapanagiotou… - … Security Journal: A …, 2018 - Taylor & Francis
ABSTRACT The Internet of things (IoT) is intended for ubiquitous connectivity among
different entities or “things”. While it provides effective and efficient solutions to many real …

Internet of things: Survey on security and privacy

DM Mendez, I Papapanagiotou, B Yang - arXiv preprint arXiv:1707.01879, 2017 - arxiv.org
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities
or" things". While its purpose is to provide effective and efficient solutions, security of the …

A survey on ai/ml-driven intrusion and misbehavior detection in networked autonomous systems: Techniques, challenges and opportunities

O Ajibuwa, B Hamdaoui, AA Yavuz - arXiv preprint arXiv:2305.05040, 2023 - arxiv.org
AI/ML-based intrusion detection systems (IDSs) and misbehavior detection systems (MDSs)
have shown great potential in identifying anomalies in the network traffic of networked …

BitFund: A blockchain-based crowd funding platform for future smart and connected nation

V Hassija, V Chamola, S Zeadally - Sustainable Cities and Society, 2020 - Elsevier
The rapid growth in information technology and related talent has let to a competition among
the investors to look for the best available talent. Additionally, the diverse range of directions …

Look before you leap: Secure connection bootstrapping for 5g networks to defend against fake base-stations

A Singla, R Behnia, SR Hussain, A Yavuz… - Proceedings of the 2021 …, 2021 - dl.acm.org
The lack of authentication protection for bootstrapping messages broadcast by base-stations
makes impossible for devices to differentiate between a legitimate and a fake base-station …

Insecure connection bootstrapping in cellular networks: the root of all evil

SR Hussain, M Echeverria, A Singla… - Proceedings of the 12th …, 2019 - dl.acm.org
In the cellular ecosystem, base stations act as trusted intermediaries between cellular
devices and the core network. During connection bootstrapping, devices currently, however …

Water cycle algorithm tuned fuzzy expert system for trusted routing in smart grid communication network

D Velusamy, GK Pugalendhi - IEEE Transactions on Fuzzy …, 2020 - ieeexplore.ieee.org
Finding an optimal route for reliable data delivery in the smart grid communication network
(SGCN) is a challenging task due to its dynamic nature. Even though the rule set (RS) and …

Practical cryptographic forensic tools for lightweight internet of things and cold storage systems

SE Nouma, AA Yavuz - Proceedings of the 8th ACM/IEEE Conference …, 2023 - dl.acm.org
Internet of Things (IoT) and Storage-as-a-Service (STaaS) continuum permit cost-effective
maintenance of security-sensitive information collected by IoT devices over cloud systems. It …

Characterizing and detecting non-consensual photo sharing on social networks

T Zheng, T Zhou, Q Liu, K Wu, Z Cai - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Photo capturing and sharing have become routine daily activities for social platform users.
Alongside the entertainment of social interaction, we are experiencing tremendous visual …

Modified pqsigRM: RM code-based signature scheme

Y Lee, W Lee, YS Kim, JS No - IEEE Access, 2020 - ieeexplore.ieee.org
We present a novel code-based signature scheme called modified pqsigRM. This scheme is
based on a modified Reed-Muller (RM) code, which reduces the signing complexity and key …