Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies

K Kaur, A Kaur, Y Gulzar, V Gandhi - Frontiers in Computer Science, 2024 - frontiersin.org
The Internet of Things (IoT) is a collection of devices such as sensors for collecting data,
actuators that perform mechanical actions on the sensor's collected data, and gateways …

Defense and Security Mechanisms in the Internet of Things: A Review.

S Szymoniak, J Piątkowski… - Applied Sciences (2076 …, 2025 - search.ebscohost.com
Abstract The Internet of Things (IoT) transforms traditional technology by introducing smart
devices into almost every field, enabling real-time monitoring and automation. Despite the …

Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks

V Kandasamy, AA Roseline - Scientific Reports, 2025 - nature.com
The growing number of connected devices in smart home environments has amplified
security risks, particularly from Man-in-the-Middle (MitM) attacks. These attacks allow …

A Comprehensive Review on Cryptographic Techniques for Securing Internet of Medical Things: A State-of-the-Art, Applications, Security Attacks, Mitigation Measures …

W Robert, A Denis, A Thomas… - Mesopotamian …, 2024 - journals.mesopotamian.press
As healthcare becomes increasingly dependent on the Internet of Medical Things (IoMT)
infrastructure, it is essential to establish a secure system that guarantees the confidentiality …

AI in Combatting Man-in-the-Middle Attacks: A Comprehensive Review

N Mohamed, AA Ahmed - 2024 15th International Conference …, 2024 - ieeexplore.ieee.org
In the evolving landscape of cybersecurity, Man-in-the-Middle (MitM) attacks represent a
significant and persistent threat, capable of intercepting and manipulating digital …

Security Assessment of Industrial Control System Applying Reinforcement Learning

M Ibrahim, R Elhafiz - Processes, 2024 - mdpi.com
Industrial control systems are often used to assist and manage an industrial operation.
These systems' weaknesses in the various hierarchical structures of the system components …

A survey of transmission control protocol variants

LM Machora - World Journal of Advanced Research and Reviews, 2024 - wjarr.co.in
TCP (Transmission Control Protocol), is a reliable connection oriented end-to-end protocol.
It contains within itself, mechanisms for ensuring reliability by requiring the receiver to …

[PDF][PDF] TCP/IP stack transport layer performance, privacy, and security issues

OO Felix - World Journal of Advanced Engineering Technology …, 2024 - researchgate.net
Abstract Transmission Control Protocol/Internet Protocol (TCP/IP) is the backbone of Internet
transmission. The Transport Layer of the TCP/IP stack, which includes TCP (Transmission …

Dynamic Content Security Policy Generation at Client-Side to Mitigate XSS Attacks

RP Singh, BR Chandavarkar - 2024 15th International …, 2024 - ieeexplore.ieee.org
Cross-site scripting (XSS) attacks are a major threat to web applications and have
consistently ranked among the OWASP Top 10 vulnerabilities. Attackers can inject malicious …

Mencegah Serangan Session Hijacking pada WEB PHP

IP Saputra - SMART: Jurnal Teknologi Informasi dan …, 2024 - journal.bengkuluinstitute.com
Serangan session hijacking merupakan ancaman serius bagi keamanan aplikasi web yang
dapat menyebabkan pencurian sesi pengguna dan akses tidak sah ke informasi sensitif …