Design and implementation of IoT-based automation system for smart home

WA Jabbar, MH Alsibai, NSS Amran… - 2018 International …, 2018 - ieeexplore.ieee.org
Home Automation System (HAS) gains popularity due to communication technology
advancement. Smart home is one of the Internet of Things (IoT) applications that facilitates …

Hybrid end-to-end VPN security approach for smart IoT objects

M Juma, AA Monem, K Shaalan - Journal of Network and Computer …, 2020 - Elsevier
Abstract The End-to-End VPN security has an essential role especially in connecting smart
objects in the Internet of Things (IoT) environments. It noted that security is a crucial issue in …

Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem

T Sahraneshin, R Malekhosseini, F Rad… - Wireless …, 2023 - Springer
Abstract The Internet of Things, also called IoT for short, consists of billions of devices
distributed around the world, all of which are connected through the Internet. Data is …

A survey on smart home authentication: Toward secure, multi-level and interaction-based identification

S AlJanah, N Zhang, SW Tay - IEEE Access, 2021 - ieeexplore.ieee.org
With the increased number and reduced cost of smart devices, Internet of Things (IoT)
applications such as smart home (SHome) are increasingly popular. Owing to the …

[PDF][PDF] Attacks classification and security mechanisms in Wireless Sensor Networks

A Kardi, R Zagrouba - Advances in Science, Technology and …, 2019 - researchgate.net
This paper proposes a new classification model distinguishing four classes of attacks in
Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the …

[PDF][PDF] INDUSTRIAL INTERNET OF THINGS VULNERABILITIES AND THREATS: WHAT STAKEHOLDERS NEED TO CONSIDER.

F Hoffman - Issues in Information Systems, 2019 - academia.edu
ABSTRACT The Industrial Internet of Things, or IIoT, introduces Internet-enabled devices
into industrial process systems operating in the energy, transportation, healthcare, utilities …

Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis

DP Acharjya, NSS Ahmed - Peer-to-Peer Networking and Applications, 2021 - Springer
The propagation of 5G, beyond 5G and Internet of Everything (IoE) networks are the key
business force for future networks and its various applications. These networks have been …

Detection of Assaults in Network Intrusion System using Rough Set and Convolutional Neural Network

N Syed Siraj Ahmed, AB Feroz Khan - Wireless Personal Communications, 2024 - Springer
The exponential growth of network data traffic has posed significant challenges to
conventional intrusion recognition systems. These systems often struggle with feature …

Smart business process modeling: Toward an IoT to detect the data flow anomalies in ad hoc mesh network

N Chadli, M Elhoseny, MI Kabbaj… - Distributed Sensing and …, 2022 - Springer
The smart business processes modeling SBPM in a new technology used an Internet of
Things IoT in the big companies. The IoT contribute by the owners of these keys such as a …

Development models and patterns for elevated network connectivity in internet of things

S Kiran, G Gupta - Materials Today: Proceedings, 2023 - Elsevier
The technology of networking allows IoT devices to connect to other cloud-based devices,
applications and services. To provide safe and dependable communication across diverse …