A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities

B Alotaibi - Sensors, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …

A computational trust model for social IoT based on interval neutrosophic numbers

S Pourmohseni, M Ashtiani, AA Azirani - Information Sciences, 2022 - Elsevier
Nowadays, the trend of evolution of connected devices, communication networks, and cloud
services towards the internet of things (IoT) has facilitated the interaction between smart …

A novel deep learning-based approach for detecting attacks in social IoT

R Mohan Das, U Arun Kumar, S Gopinath, V Gomathy… - Soft Computing, 2023 - Springer
In the innovative concept of the “Social Internet of Things”(IoT), the IoT is combined with
social platforms so that inanimate devices can form their interactions with one another. Still …

Internet of Things-Building Information Modeling Integration: Attacks, Challenges, and Countermeasures

BH Mohammed, H Sallehudin, SA Mohamed… - IEEE …, 2022 - ieeexplore.ieee.org
Fifth-generation (5G) technology is now being established globally and is a central topic of
discussion for future generations. The building sector is at risk because the internet of things …

A Conceptual Framework for Securing IoT-BIM

BH Mohammed, A Husairi, H Sallehudin… - 2022 Applied …, 2022 - ieeexplore.ieee.org
Recently, the Internet of Things and building information modeling (IoT-BIM) has captured
attention because of its wide range of applications in multiple domains communicating …

Exploring Trust Modelling and Management Techniques in the Context of Distributed Wireless Networks: A Literature Review

T Lenard, A Collen, M Benyahya, NA Nijdam… - IEEE …, 2023 - ieeexplore.ieee.org
Trust Modelling and Management (TMM) techniques are frequently applied in ad-hoc
Distributed Wireless Networks (DWNs) to stimulate and improve cooperation between …

Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments

A Yu, J Kang, W Jiang, D Lin - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the continuous advancement of sensing, networking, controlling, and computing
technologies, there is a growing number of IoT (Internet of Things) devices emerging that are …

SIoT identity management with the ability to preserve owner privacy and built‐in resistance to Sybil attacks

A Dayyani, M Abbaspour - Concurrency and Computation …, 2024 - Wiley Online Library
Summary The Social Internet of Things (SIoT) allows for more efficient and intelligent
communication between entities (humans and objects). Managing the digital identity of …

Authentication and Authorization

FA Alaba - Internet of Things: A Case Study in Africa, 2024 - Springer
The use of authentication and access control systems is crucial in the Internet of Things.
Because Internet of Things devices are so dependent on the reliability of their other linked …

Attacks and Countermeasures in the IoT Layers

FA Alaba - Internet of Things: A Case Study in Africa, 2024 - Springer
In this chapter, we detail the known security flaws, attack vectors, and mitigation strategies
applicable to the IoT. We evaluated a large body of prior work in IoT security that takes …