Current research on Internet of Things (IoT) security: A survey

WH Hassan - Computer networks, 2019 - Elsevier
The results of IoT failures can be severe, therefore, the study and research in security issues
in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy …

[HTML][HTML] Authentication and identity management of IoHT devices: achievements, challenges, and future directions

M Mamdouh, AI Awad, AAM Khalaf, HFA Hamed - Computers & Security, 2021 - Elsevier
Abstract The Internet of Things (IoT) paradigm serves as an enabler technology in several
domains. Healthcare is one of the domains in which the IoT plays a vital role in increasing …

IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …

Green Internet of Things (GIoT): Applications, practices, awareness, and challenges

MA Albreem, AM Sheikh, MH Alsharif, M Jusoh… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of things (IoT) is one of key pillars in fifth generation (5G) and beyond 5G (B5G)
networks. It is estimated to have 42 billion IoT devices by the year 2025. Currently, carbon …

The rise of ransomware and emerging security challenges in the Internet of Things

I Yaqoob, E Ahmed, MH ur Rehman, AIA Ahmed… - Computer Networks, 2017 - Elsevier
With the increasing miniaturization of smartphones, computers, and sensors in the Internet of
Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have …

A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

Static analysis for discovering IoT vulnerabilities

P Ferrara, AK Mandal, A Cortesi, F Spoto - International Journal on …, 2021 - Springer
Abstract The Open Web Application Security Project (OWASP), released the “OWASP Top
10 Internet of Things 2018” list of the high-priority security vulnerabilities for IoT systems. The …

Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey

V Sharma, I You, K Andersson, F Palmieri… - IEEE …, 2020 - ieeexplore.ieee.org
With an enormous range of applications, the Internet of Things (IoT) has magnetized
industries and academicians from everywhere. IoT facilitates operations through ubiquitous …

Future wireless communication technology towards 6G IoT: An application-based analysis of IoT in real-time location monitoring of employees inside underground …

SK Pattnaik, SR Samal, S Bandopadhaya, K Swain… - Sensors, 2022 - mdpi.com
In recent years, the IoT has emerged as the most promising technology in the key evolution
of industry 4.0/industry 5.0, smart home automation (SHA), smart cities, energy savings and …

AI4SAFE-IoT: An AI-powered secure architecture for edge layer of Internet of things

H HaddadPajouh, R Khayami, A Dehghantanha… - Neural Computing and …, 2020 - Springer
With the increasing use of the Internet of things (IoT) in diverse domains, security concerns
and IoT threats are constantly rising. The computational and memory limitations of IoT …