Consumer IoT: Security vulnerability case studies and solutions

T Alladi, V Chamola, B Sikdar… - IEEE Consumer …, 2020 - ieeexplore.ieee.org
As consumer Internet of Things (IoT) devices become increasingly pervasive in our society,
there is a need to understand the underpinning security risks. Therefore, in this article, we …

Internet of things impact on supply chain management

K Pal - Procedia Computer Science, 2023 - Elsevier
Traditional supply chains deal with uncertainty, cost, complexity, and vulnerability problems.
In order to overcome these problems, supply chain operations need to be innovative in …

[HTML][HTML] VPNFilter malware analysis on cyber threat in smart home network

JC Sapalo Sicato, PK Sharma, V Loia, JH Park - Applied Sciences, 2019 - mdpi.com
Recently, the development of smart home technologies has played a crucial role in
enhancing several real-life smart applications. They help improve the quality of life through …

Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice

K Chen, S Zhang, Z Li, Y Zhang, Q Deng, S Ray… - Journal of Hardware and …, 2018 - Springer
Recent years have seen rapid development and deployment of Internet-of-Things (IoT)
applications in a diversity of application domains. This has resulted in creation of new …

Vulnerability studies and security postures of IoT devices: A smart home case study

BD Davis, JC Mason, M Anwar - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) technology has revolutionized our daily lives in many ways-whether
it is the way we conduct our day-to-day activities inside our home, or the way we control our …

Understanding the purchase intention of fitness wearables: using value-based adoption model

B Mathavan, A Vafaei-Zadeh, H Hanifah… - Asia-Pacific Journal of …, 2024 - emerald.com
Purpose This paper aims to investigate the key enablers and inhibitors that influence the
intention to use fitness wearables using the value-based adoption model (VAM) …

[HTML][HTML] PRASH: a framework for privacy risk analysis of smart homes

J Bugeja, A Jacobsson, P Davidsson - Sensors, 2021 - mdpi.com
Smart homes promise to improve the quality of life of residents. However, they collect vasts
amounts of personal and sensitive data, making privacy protection critically important. We …

Security Issues and Solutions for Resource-Constrained IoT Applications Using Lightweight Cryptography

K Pal - Cybersecurity Issues, Challenges, and Solutions in the …, 2023 - igi-global.com
The internet of things (IoT) is ushering in a new dawn of technological innovations in recent
decades for commercial applications. The technological innovation commercial applications …

A survey on behavioral pattern mining from sensor data in Internet of Things

MM Rashid, J Kamruzzaman, MM Hassan… - IEEE …, 2020 - ieeexplore.ieee.org
The deployment of large-scale wireless sensor networks (WSNs) for the Internet of Things
(IoT) applications is increasing day-by-day, especially with the emergence of smart city …

Toward uniform smart healthcare ecosystems: A survey on prospects, security, and privacy considerations

H Habibzadeh, T Soyata - Connected health in smart cities, 2020 - Springer
A plethora of interwoven social enablers and technical advancements have elevated smart
healthcare from once a supplemental feature to now an indispensable necessity crucial to …