Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

A deep learning-based intrusion detection system for MQTT enabled IoT

MA Khan, MA Khan, SU Jan, J Ahmad, SS Jamal… - Sensors, 2021 - mdpi.com
A large number of smart devices in Internet of Things (IoT) environments communicate via
different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely …

[HTML][HTML] TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks

S Ullah, J Ahmad, MA Khan, MS Alshehri, W Boulila… - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a global network that connects a large number of
smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to …

Internet of Things in healthcare: A survey on protocol standards, enabling technologies, WBAN architectures and open issues

VJ Aski, VS Dhaka, A Parashar, I Rida - Physical Communication, 2023 - Elsevier
This paper provides a state-of-art review on healthcare-IoT infrastructure, prominently
focusing on protocol standards, enabling technologies, wireless body area network (WBAN) …

A novel intelligent approach for man‐in‐the‐middle attacks detection over internet of things environments based on message queuing telemetry transport

Á Michelena, J Aveleira‐Mata, E Jove… - Expert …, 2024 - Wiley Online Library
One of the most common attacks is man‐in‐the‐middle (MitM) which, due to its complex
behaviour, is difficult to detect by traditional cyber‐attack detection systems. MitM attacks on …

An autoML network traffic analyzer for cyber threat detection

A Papanikolaou, A Alevizopoulos, C Ilioudis… - International Journal of …, 2023 - Springer
Timely detection and effective treatment of cyber-attacks for protecting personal and
sensitive data from unauthorized disclosure constitute a core demand of citizens and a legal …

[PDF][PDF] Feature Engineering for Cyber-attack detection in Internet of Things

MB Dissanayake - International Journal of wireless and …, 2021 - researchgate.net
Internet of Things (IoT) consists of group of devices which communicates information over
private networks. One of the key challenges faced by IoT networks is the security breaches …

Modular robot networking: a novel schema and its performance assessment

K Holdcroft, A Bolotnikova, C Belke… - 2022 IEEE/RSJ …, 2022 - ieeexplore.ieee.org
Modular robots (MRs) consist of unique robots which interconnect and work as a collective
to perform objectives. Coordinating these robots rely on robust communication, as modules …

Online‐Semisupervised Neural Anomaly Detector to Identify MQTT‐Based Attacks in Real Time

Z Gao, J Cao, W Wang, H Zhang… - Security and …, 2021 - Wiley Online Library
Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and
uninterrupted exchange of signals or information between related parties. The application of …

Improvement of MQTT semantic to minimize data flow in IoT platforms based on distributed brokers

K Kamoun, F Hmissi, S Ouni… - Transactions on Emerging …, 2024 - Wiley Online Library
Message queuing telemetry transport (MQTT) is an application layer protocol that enables
effective device communication in the Internet of Things (IoT). MQTT operates according to a …