A survey on Classification of Cyber-attacks on IoT and IIoT devices

Y Shah, S Sengupta - 2020 11th IEEE Annual Ubiquitous …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices have gained popularity in recent years. With the increased
usage of IoT devices, users have become more prone to Cyber-attacks. Threats against IoT …

[PDF][PDF] Security challenges: M2M communication in IoT

D Pradhan, HM Tun - J. Electr. Eng. Autom, 2022 - researchgate.net
In recent times, smart devices, smart homes, smart manufacturing, and even smart cities, all
of which are connected to the Internet of Things (IoT) have become quite common. IoT …

Security challenges in the transition to 4G mobile systems in developing countries

FM Asmare, LG Ayalew - Cogent Engineering, 2023 - Taylor & Francis
Abstract 4 G mobile networks have evolved to meet the ever-increasing demand and
requirements of users. 4 G will provide comprehensive IP solutions, allowing users to access …

Blockchain-based infrastructure to enable trust in IoT environment

L De Santis, V Paciello… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Nowadays, with the further development of telecommunication, IoT technology has become
a concrete reality of everyday life. However, the widespread adoption of such technologies …

Security challenges and solutions in IoT networks for the smart cities

A Procopiou, TM Chen - Internet of Things, 2022 - taylorfrancis.com
It is estimated that by 2030, more than 60% of the population is going to live in cities.
Overpopulation in urban cities causes numerous problems including environmental …

A secure authentication and key exchange protocol for M2M communication

C Thammarat… - 2021 9th International …, 2021 - ieeexplore.ieee.org
Machine-to-machine (M2M) communication is undergoing rapid growth as more devices are
connected. In order to ensure secure communication between devices, certain security …

Accelerant facilitation for an adaptive weighting-based multi-index assessment of cyber physical power systems

S Chan, P Nopphawan - 2023 IEEE 3rd International …, 2023 - ieeexplore.ieee.org
The determination of criteria weights is known to be a challenging and complex issue,
particularly for the Multi-Criteria Decision Making (MCDM) problems involved in the …

An architecture for M2M communications over cellular networks using clustering and hybrid TDMA-NOMA

AB Rozario, MF Hossain - 2018 6th International Conference …, 2018 - ieeexplore.ieee.org
Machine-to-Machine (M2M) communications have now become a highly promising affiliate
of the future fifth generation (5G) cellular networks. This paper proposes a novel architecture …

Blockchain-Based Authentication Protocol for Wireless M2M Area Networks with Sidechain Integration

KE Bilami, J Gaber, P Lorenz - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
In the context of M2M communications, security presents a significant challenge for
researchers due to complexities introduced by the large deployment, decentralization, and …

Tree-Based Group Diffie-Hellman for subgroup communication in M2M networks

K Rajesh, M Das, S Nandi - 2021 IEEE 18th India Council …, 2021 - ieeexplore.ieee.org
Machine to Machine (M2M) communication deals with exchanging messages between any
large group of machines over a wired or wireless channel. Such systems are usually not …