[HTML][HTML] Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke, J Jiang… - Security and …, 2017 - hindawi.com
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions

R Chaganti, B Bhushan, V Ravi - Computer Communications, 2023 - Elsevier
With the proliferation of new technologies such as the Internet of Things (IoT) and Software-
Defined Networking (SDN) in recent years, the Distributed Denial of Service (DDoS) attack …

Privacy-preserving blockchain-based federated learning for traffic flow prediction

Y Qi, MS Hossain, J Nie, X Li - Future Generation Computer Systems, 2021 - Elsevier
As accurate and timely traffic flow information is extremely important for traffic management,
traffic flow prediction has become a vital component of intelligent transportation systems …

Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities

M Alazab, K Lakshmanna, T Reddy, QV Pham… - Sustainable Energy …, 2021 - Elsevier
Typically, there are a lot of challenges to be faced with providing better performance and
energy optimization in the Internet of Things (IoT) in a smart city. In IoT and wireless sensor …

Deep graph neural network-based spammer detection under the perspective of heterogeneous cyberspace

Z Guo, L Tang, T Guo, K Yu, M Alazab… - Future generation …, 2021 - Elsevier
Due to the severe threat to cyberspace security, detection of online spammers has been a
universal concern of academia. Nowadays, prevailing literature of this field almost leveraged …

An integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals

R Kumar, WY Wang, J Kumar, T Yang, A Khan… - … Medical Imaging and …, 2021 - Elsevier
Deep learning, for image data processing, has been widely used to solve a variety of
problems related to medical practices. However, researchers are constantly struggling to …

Artificial intelligence for securing industrial-based cyber–physical systems

Z Lv, D Chen, R Lou, A Alazab - Future generation computer systems, 2021 - Elsevier
Objective: The combination of artificial intelligence and cyber–physical​ systems (CPSs) in
buildings has many advantages. Therefore, CPSs and artificial intelligence are studied …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Big data for cybersecurity: Vulnerability disclosure trends and dependencies

MJ Tang, M Alazab, Y Luo - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
Complex Big Data systems in modern organisations are progressively becoming attack
targets by existing and emerging threat agents. Elaborate and specialised attacks will …

A heuristic angular clustering framework for secured statistical data aggregation in sensor networks

L Krishnasamy, RK Dhanaraj, D Ganesh Gopal… - Sensors, 2020 - mdpi.com
Clustering in wireless sensor networks plays a vital role in solving energy and scalability
issues. Although multiple deployment structures and cluster shapes have been …