Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey

S Zaman, K Alhazmi, MA Aseeri, MR Ahmed… - Ieee …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …

[HTML][HTML] Architectural threats to security and privacy: a challenge for internet of things (IoT) applications

Y Khan, MBM Su'ud, MM Alam, SF Ahmad, NA Salim… - Electronics, 2022 - mdpi.com
The internet of things (IoT) is one of the growing platforms of the current era that has
encircled a large population into its domain, and life appears to be useless without adopting …

IoT malicious traffic identification using wrapper-based feature selection mechanisms

M Shafiq, Z Tian, AK Bashir, X Du, M Guizani - Computers & Security, 2020 - Elsevier
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …

Privacy-preserving federated learning framework based on chained secure multiparty computing

Y Li, Y Zhou, A Jolfaei, D Yu, G Xu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Federated learning (FL) is a promising new technology in the field of IoT intelligence.
However, exchanging model-related data in FL may leak the sensitive information of …

[HTML][HTML] Digitalization in omnichannel healthcare supply chain businesses: The role of smart wearable devices

V Chang, QA Xu, K Hall, YA Wang, MM Kamal - Journal of Business …, 2023 - Elsevier
The advancement in technology has fostered the prevalence of the Internet of Things (IoT),
which enhances healthcare business quality, offers a seamless customer experience, and …

Multi-objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities

M Alazab, K Lakshmanna, T Reddy, QV Pham… - Sustainable Energy …, 2021 - Elsevier
Typically, there are a lot of challenges to be faced with providing better performance and
energy optimization in the Internet of Things (IoT) in a smart city. In IoT and wireless sensor …

A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing

P Kumar, R Kumar, GP Gupta… - Transactions on …, 2021 - Wiley Online Library
With the advancement of blockchain technology, and the proliferation of Internet of things
(IoT)‐driven devices, the blockchain‐IoT applications is changing the perception and …

[HTML][HTML] Security requirements for the internet of things: A systematic approach

S Pal, M Hitchens, T Rabehaja, S Mukhopadhyay - Sensors, 2020 - mdpi.com
There has been a tremendous growth in the number of smart devices and their applications
(eg, smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday …

Lightweight cryptographic protocols for IoT-constrained devices: A survey

MN Khan, A Rao, S Camtepe - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …

Implementation of IoT in various domains

J Kaur, Jaskaran, N Sindhwani, R Anand… - IoT Based Smart …, 2022 - Springer
Abstract The Internet of Things (IoT) impacts the advancement of house automation, health
care, security, and privacy. We use the Internet of Things for industry 4. The smart home …