Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management

I Lee - Future internet, 2020 - mdpi.com
Along with the growing threat of cyberattacks, cybersecurity has become one of the most
important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce …

[HTML][HTML] Security challenges to smart agriculture: Current state, key issues, and future directions

AR de Araujo Zanella, E da Silva, LCP Albini - Array, 2020 - Elsevier
Smart agriculture integrates a set of technologies, devices, protocols, and computational
paradigms to improve agricultural processes. Big data, artificial intelligence, cloud, and edge …

IoT Privacy and security: Challenges and solutions

L Tawalbeh, F Muheidat, M Tawalbeh, M Quwaider - Applied Sciences, 2020 - mdpi.com
Privacy and security are among the significant challenges of the Internet of Things (IoT).
Improper device updates, lack of efficient and robust security protocols, user unawareness …

Edge computing: A survey

WZ Khan, E Ahmed, S Hakak, I Yaqoob… - Future Generation …, 2019 - Elsevier
In recent years, the Edge computing paradigm has gained considerable popularity in
academic and industrial circles. It serves as a key enabler for many future technologies like …

Moving towards smart cities: Solutions that lead to the Smart City Transformation Framework

H Kumar, MK Singh, MP Gupta, J Madaan - Technological forecasting and …, 2020 - Elsevier
A city is a large and permanent human ecosystem which provides a lot of services and
opportunities to its citizens. The rapid urbanization and increasing population have put a lot …

Security and trust issues in fog computing: A survey

PY Zhang, MC Zhou, G Fortino - Future Generation Computer Systems, 2018 - Elsevier
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …

Semi-supervised learning based distributed attack detection framework for IoT

S Rathore, JH Park - Applied Soft Computing, 2018 - Elsevier
Alongside the development of Internet of Things (IoT), security attacks are also increasing
day by day. A number of centralized attack detection mechanisms have been proposed to …

Scheduling Internet of Things requests to minimize latency in hybrid Fog–Cloud​ computing

RO Aburukba, M AliKarrar, T Landolsi… - Future Generation …, 2020 - Elsevier
Delivering services for Internet of Things (IoT) applications that demand real-time and
predictable latency is a challenge. Several IoT applications require stringent latency …

Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system

Y Yang, X Zheng, W Guo, X Liu, V Chang - Information Sciences, 2019 - Elsevier
In this paper, a privacy-preserving smart IoT-based healthcare big data storage system with
self-adaptive access control is proposed. The aim is to ensure the security of patients' …

An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment

R SaiSindhuTheja, GK Shyam - Applied Soft Computing, 2021 - Elsevier
Abstract Detection of Denial of Service (DoS) attack is one of the most critical issues in cloud
computing. The attack detection framework is very complex due to the nonlinear thought of …