Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing

S Cherbal, A Zier, S Hebal, L Louail… - The Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

Collective remote attestation at the Internet of Things scale: State-of-the-art and future challenges

M Ambrosin, M Conti, R Lazzeretti… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In recent years, the booming of Internet of Things (IoT) has populated the world with billions
of smart devices that implement novel services and applications. The potential for …

Healthcare internet of things: Security threats, challenges and future research directions

M Adil, MK Khan, N Kumar, M Attique… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) applications are switching from general to precise in different
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …

Twenty-one key factors to choose an iot platform: Theoretical framework and its applications

M Ullah, PHJ Nardelli, A Wolff… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) refers to the interconnection of physical objects via the Internet. It
utilizes complex back-end systems that need different capabilities depending on the …

Simple: A remote attestation approach for resource-constrained iot devices

M Ammar, B Crispo, G Tsudik - 2020 ACM/IEEE 11th …, 2020 - ieeexplore.ieee.org
Remote Attestation (RA) is a security service that detects malware presence on remote IoT
devices by verifying their software integrity by a trusted party (verifier). There are three main …

[HTML][HTML] PROVE: Provable remote attestation for public verifiability

E Dushku, MM Rabbani, J Vliegen, A Braeken… - Journal of Information …, 2023 - Elsevier
The expanding attack surface of Internet of Things (IoT) systems calls for innovative security
approaches to verify the reliability of IoT devices. To this end, Remote Attestation (RA) …

FeSA: Automatic federated swarm attestation on dynamic large-scale iot devices

B Kuang, A Fu, Y Gao, Y Zhang, J Zhou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Swarm attestation, as an important branch of Remote Attestation (RA), enables a trusted
party (verifier) to verify the security states of multiple devices (provers) in a large network …

Verify&revive: Secure detection and recovery of compromised low-end embedded devices

M Ammar, B Crispo - Proceedings of the 36th Annual Computer Security …, 2020 - dl.acm.org
Tiny and specialized computing platforms, so-called embedded or Internet of Things (IoT)
devices, are increasingly used in safety-and privacy-critical application scenarios. A …