Wireless communication technologies for IoT in 5G: Vision, applications, and challenges

QV Khanh, NV Hoai, LD Manh, AN Le… - … and Mobile Computing, 2022 - Wiley Online Library
Communication technologies are develo** very rapidly and achieving many breakthrough
results. The advent of 5th generation mobile communication networks, the so‐called 5G, has …

A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities

B Alotaibi - Sensors, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …

Access control and authorization in smart homes: A survey

ZN Mohammad, F Farha… - Tsinghua Science …, 2021 - ieeexplore.ieee.org
With the rapid development of cyberspace and smart home technology, human life is
changing to a new virtual dimension with several promises for improving its quality …

Reinforcement learning solution for cyber-physical systems security against replay attacks

Y Yu, W Yang, W Ding, J Zhou - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The security problem of state estimation plays a critical role in monitoring and managing
operation of cyber-physical systems (CPS). This paper considers the problem of network …

A survey of iot privacy security: Architecture, technology, challenges, and trends

P Sun, S Shen, Y Wan, Z Wu, Z Fang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control
and report environmental changes, prevent fires, and perform many more beneficial …

[HTML][HTML] A review of Power System False data attack Detection Technology based on Big data

Z Chang, J Wu, H Liang, Y Wang, Y Wang, X **ong - Information, 2024 - mdpi.com
As power big data plays an increasingly important role in the operation, maintenance, and
management of power systems, complex and covert false data attacks pose a serious threat …

Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control

N Hussein, A Nhlabatsi - IoT, 2022 - mdpi.com
The Internet of Things (IoT) has provided substantial enhancements to the communication of
sensors, actuators, and their controllers, particularly in the field of home automation. Home …

Lightweight secure detection service for malicious attacks in wsn with timestamp-based mac

Z Zhai, G Lai, B Cheng, J Qian, L Zhao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Sensors in wireless sensor network (WSN) are usually deployed in the wild or even hostile
circumstance. What is worse, most of the sensors have limited communication bandwidth …

A comparative study of machine learning classifiers for secure RF-PUF-based authentication in internet of things

A Ashtari, B Alizadeh - Microprocessors and Microsystems, 2022 - Elsevier
This paper presents a RF-PUF-based authentication framework which exploits the intrinsic
non-idealities in the physical characteristic of devices to generate a unique identity for …

Zigbee-Based Low Power Consumption Wearables Device for Voice Data Transmission

AS AlShuhail, S Bhatia, A Kumar, B Bhushan - Sustainability, 2022 - mdpi.com
Short-range wireless technologies can transmit real-time voice, audio, picture, and video
communications. Such networks' energy usage and transmission reach are crucial …