Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets

E Gyamfi, A Jurcut - Sensors, 2022 - mdpi.com
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …

MEC-enabled 5G use cases: a survey on security vulnerabilities and countermeasures

P Ranaweera, A Jurcut, M Liyanage - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The future of mobile and internet technologies are manifesting advancements beyond the
existing scope of science. The concepts of automated driving, augmented-reality, and …

Security considerations for Internet of Things: A survey

A Jurcut, T Niculcea, P Ranaweera, NA Le-Khac - SN Computer Science, 2020 - Springer
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …

Towards blockchain-enabled security technique for industrial internet of things based decentralized applications

AH Sodhro, S Pirbhulal, M Muzammal… - Journal of Grid …, 2020 - Springer
Abstract As the Industrial Internet of Things (IIoT) is one of the emerging trends and
paradigm shifts to revolutionize the traditional industries with the fourth wave of evolution or …

Blockchain assisted clustering with intrusion detection system for industrial internet of things environment

RF Mansour - Expert Systems with Applications, 2022 - Elsevier
Industry 4.0 has the potential to create new industrial revolution by offering intelligent,
secure, independent, and self-adaptive Industrial Internet of Things (IIoT) networks. These …

Towards cognitive authentication for smart healthcare applications

AH Sodhro, C Sennersten, A Ahmad - Sensors, 2022 - mdpi.com
Secure and reliable sensing plays the key role for cognitive tracking ie, activity identification
and cognitive monitoring of every individual. Over the last years there has been an …

Federated learning for distributed IIoT intrusion detection using transfer approaches

J Zhang, C Luo, M Carpenter… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Considering that low-cost and resource-cons-trained sensors coupled inherently could be
vulnerable to growing numbers of intrusion threats, industrial Internet-of-Things (IIoT) …

Decentralized energy efficient model for data transmission in IoT-based healthcare system

AH Sodhro, MS Al-Rakhami, L Wang… - 2021 IEEE 93rd …, 2021 - ieeexplore.ieee.org
The growing world population is facing challenges such as increased chronic diseases and
medical expenses. Integrate the latest modern technology into healthcare system can …

Novel trajectory privacy protection method against prediction attacks

S Qiu, D Pi, Y Wang, Y Liu - Expert Systems with Applications, 2023 - Elsevier
When the public uses Location-based Services (LBSs), their location information is
constantly exposed. Owing to the spatiotemporal correlation of trajectories, it is easy for …

Security enhanced authentication protocol for space-ground integrated railway networks

Y Wang, W Zhang, X Wang, MK Khan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Software Defined Network (SDN)-based space-ground integrated railway
communication networks have attracted widespread attention from academia and industry …