[HTML][HTML] Cyber-security threats and side-channel attacks for digital agriculture

AN Alahmadi, SU Rehman, HS Alhazmi, DG Glynn… - Sensors, 2022 - mdpi.com
The invention of smart low-power devices and ubiquitous Internet connectivity have
facilitated the shift of many labour-intensive jobs into the digital domain. The shortage of …

A systematic survey: security threats to UAV-aided IoT applications, taxonomy, current challenges and requirements with future research directions

M Adil, MA Jan, Y Liu, H Abulkasim… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) as an intermediary can offer an efficient and useful
communication paradigm for different Internet of Things (IoT) applications. Following the …

Near real-time security system applied to SDN environments in IoT networks using convolutional neural network

MVO de Assis, LF Carvalho, JJPC Rodrigues… - Computers & Electrical …, 2020 - Elsevier
Abstract The Internet of Things (IoT) paradigm brings new and promising possibilities for
services and products. The heterogeneity of IoT devices highlights the inefficiency of …

[HTML][HTML] A systematic review of current trends in artificial intelligence for smart farming to enhance crop yield

MH Widianto, MI Ardimansyah, HI Pohan… - Journal of Robotics …, 2022 - journal.umy.ac.id
Current technology has been widely applied for development, one of which has an Artificial
Intelligence (AI) applied to Smart Farming. AI can give special capabilities to be …

Device-specific security challenges and solution in IoT edge computing: a review

A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023 - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …

Hardware security for Internet of Things identity assurance

A Cirne, PR Sousa, JS Resende… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …

[HTML][HTML] Duty-cycle electronically tunable triangular/square wave generator using LT1228 commercially available ICs for capacitive sensor interfacing

P Silapan, P Choykhuntod, R Kaewon, W Jaikla - Sensors, 2022 - mdpi.com
This paper proposes a duty-cycle electronically tunable triangular/square wave generator
using LT1228 commercially available ICs for capacitive sensor interfacing. The generator …

FPGA hardware acceleration framework for anomaly-based intrusion detection system in IoT

DM Ngo, A Temko, CC Murphy… - 2021 31st International …, 2021 - ieeexplore.ieee.org
This study proposes a versatile framework for real-time Internet of Things (IoT) network
intrusion detection using Artificial Neural Network (ANN) on heterogeneous hardware. With …

Reproducibility enhancement by optimized power analysis attacks in vulnerability assessment of iot transducers

P Arpaia, F Bonavolonta, N Moccaldi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
An improvement in the metrological repeatability and reproducibility of the vulnerability
assessment for Internet-of-Things transducers is proposed. In particular, the analysis and the …

Privacy-preserving smart grid traceability using blockchain over IoT connectivity

A Shahzad, K Zhang, A Gherbi - Proceedings of the 36th Annual ACM …, 2021 - dl.acm.org
Smart grid (SG) technology comes with various advantages, among others, of efficient power
distribution, reduction in cost consumption, maintain energy loss, and peak quality level in its …