The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - Computers & …, 2022 - Elsevier
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …

Smart home personal assistants: a security and privacy review

JS Edu, JM Such, G Suarez-Tangil - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Smart Home Personal Assistants (SPA) are an emerging innovation that is changing the
means by which home users interact with technology. However, several elements expose …

A survey on security and privacy issues in edge-computing-assisted internet of things

A Alwarafy, KA Al-Thelaya, M Abdallah… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an innovative paradigm envisioned to provide massive
applications that are now part of our daily lives. Millions of smart devices are deployed within …

A survey of edge computing-based designs for IoT security

K Sha, TA Yang, W Wei, S Davari - Digital Communications and Networks, 2020 - Elsevier
Pervasive IoT applications enable us to perceive, analyze, control, and optimize the
traditional physical systems. Recently, security breaches in many IoT applications have …

Gtxchain: A secure iot smart blockchain architecture based on graph neural network

J Cai, W Liang, X Li, K Li, Z Gui… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the expansion of scale, the Internet of Things (IoT) suffers more and more security
threats, and vulnerability and sensitivity to attacks are also increasing. As a distributed and …

A review on computational intelligence techniques in cloud and edge computing

M Asim, Y Wang, K Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cloud computing (CC) is a centralized computing paradigm that accumulates resources
centrally and provides these resources to users through Internet. Although CC holds a large …

Intrusion detection systems: A cross-domain overview

LN Tidjon, M Frappier… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …

Lockedge: Low-complexity cyberattack detection in iot edge computing

TT Huong, TP Bac, DM Long, BD Thang, NT Binh… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) and its applications are becoming commonplace with more devices,
but always at risk of network security. It is therefore crucial for an IoT network design to …

Proof of concept of scalable integration of internet of things and blockchain in healthcare

KP Satamraju - Sensors, 2020 - mdpi.com
The advent of Internet of Things (IoT) brought innovation along with unprecedented benefits
of convenience and efficacy in many operations that were otherwise very cumbersome. This …

[HTML][HTML] Augmenting Zero Trust Network Architecture to enhance security in virtual power plants

A Alagappan, SK Venkatachary, LJB Andrews - Energy Reports, 2022 - Elsevier
Abstract Zero Trust Network Architecture implementation is gaining popularity in the ICT
sector to defend and deter cyber threats or cyber crime. Considering the architecture's …