[HTML][HTML] Threats and corrective measures for IoT security with observance of cybercrime: A survey

S Rani, A Kataria, V Sharma, S Ghosh… - … and mobile computing, 2021 - hindawi.com
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality
and comfort. IoT has contributed significantly to numerous application areas. The stormy …

Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions

S Latif, Z Idrees, Z e Huma… - Transactions on Emerging …, 2021 - Wiley Online Library
The blockchain has emerged as an innovative and powerful technology that shows the
tremendous potential to enhance the smart industrial frameworks by providing encryption …

Enabling technologies for the internet of health things

JJPC Rodrigues, DBDR Segundo, HA Junqueira… - Ieee …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most promising technologies for the near future.
Healthcare and well-being will receive great benefits with the evolution of this technology …

A survey on security threats and countermeasures in internet of medical things (IoMT)

M Papaioannou, M Karageorgou… - Transactions on …, 2022 - Wiley Online Library
Internet of medical things (IoMT) is an emerging technology aiming to improve the patient's
quality of life by enabling personalized e‐health services without limitations on time and …

Secure short-packet communications for mission-critical IoT applications

HM Wang, Q Yang, Z Ding… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In applications of the Internet of Things (IoT), the use of short packets is expected to meet the
stringent latency requirement in ultra-reliable low-latency communications; however, the …

Blind detection: Advanced techniques for WiFi-based drone surveillance

I Bisio, C Garibotto, F Lavagetto… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
The great availability of commercial drones has raised growing interest among people, since
remotely piloted vehicles can be employed in numerous applications. The pervasive use of …

[HTML][HTML] Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets

E Gyamfi, A Jurcut - Sensors, 2022 - mdpi.com
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …

Cyber security framework for Internet of Things-based Energy Internet

AS Sani, D Yuan, J Jin, L Gao, S Yu, ZY Dong - Future Generation …, 2019 - Elsevier
With the significant improvement in deployment of Internet of Things (IoT) into the smart grid
infrastructure, the demand for cyber security is rapidly growing. The Energy Internet (EI) also …

Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the Internet of Things

NB Truong, GM Lee, TW Um… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Mobile crowd-sensing (MCS) has appeared as a prospective solution for large-scale data
collection, leveraging built-in sensors and social applications in mobile devices that enables …

Unauthorized amateur UAV detection based on WiFi statistical fingerprint analysis

I Bisio, C Garibotto, F Lavagetto… - IEEE …, 2018 - ieeexplore.ieee.org
Amateur drones are enjoying great popularity in recent years due to the wide commercial
diffusion of small, rather low-cost devices. More and more user-friendly, easy-to-pilot aerial …