A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions
P Sun, Y Wan, Z Wu, Z Fang, Q Li - Computers & Security, 2025 - Elsevier
With the continuous development of information technology, privacy protection in the Internet
of Things (IoT) has attracted people's attention. This paper summarizes and discusses the …
of Things (IoT) has attracted people's attention. This paper summarizes and discusses the …
MODSC: many-objective optimization-driven data-balancing strategy in cross-architectural malware classification for extreme IoT
Z Cui, Z Zhang, Z Zhang, W Zhang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Stable operation of IoT systems in extreme environments is critical for infrastructures,
including energy, aerospace, and healthcare. But resource-constrained devices are …
including energy, aerospace, and healthcare. But resource-constrained devices are …
FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices
Z Chen, Z Cheng, W Luo, J Ao, Y Liu, K Sheng, L Chen - Internet of Things, 2023 - Elsevier
With the rapid development of 5G mobile communication technology and the continuous
expansion of the scale of the Internet of Things (IoT) industry, the number of IoT devices has …
expansion of the scale of the Internet of Things (IoT) industry, the number of IoT devices has …
Real-Time Adaptive Anomaly Detection in Industrial IoT Environments
To ensure reliability and service availability, next-generation networks are expected to rely
on automated anomaly detection systems powered by advanced machine learning methods …
on automated anomaly detection systems powered by advanced machine learning methods …
Swarm-Net: Firmware Attestation in IoT Swarms using Graph Neural Networks and Volatile Memory
Despite large-scale deployment, studies have highlighted critical security concerns in IoT
networks, many of which stem from firmware-related issues. Furthermore, IoT swarms have …
networks, many of which stem from firmware-related issues. Furthermore, IoT swarms have …
RAM-Based Firmware Attestation for IoT Security: A Representation Learning Framework
A Iqbal, U Zia, MN Aman… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
With the proliferation of 4G and 5G mobile networks in smart cities, the adoption of Internet of
Things (IoT) devices has surged, emphasizing the critical need for robust security measures …
Things (IoT) devices has surged, emphasizing the critical need for robust security measures …
An Intelligent Fingerprinting Technique for Low-power Embedded IoT Devices
The Internet of Things (IoT) has been a popular topic for research and development in the
past decade. The resource-constrained and wireless nature of IoT devices presents a large …
past decade. The resource-constrained and wireless nature of IoT devices presents a large …
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices
Control-Flow Attestation (CFA) is a security service that allows an entity (verifier) to verify the
integrity of code execution on a remote computer system (prover). Existing CFA schemes …
integrity of code execution on a remote computer system (prover). Existing CFA schemes …
LightFAt: Mitigating Control-Flow Explosion via Lightweight PMU-Based Control-Flow Attestation
With the continuous evolution of computational devices, more and more applications are
being executed remotely. The applications operate on a wide spectrum of devices, ranging …
being executed remotely. The applications operate on a wide spectrum of devices, ranging …
SAFE-IoT: Attesting Firmware in IoT Swarms using Volatile Memory and a Mixture of Experts
Advances in 5G mobile networks and artificial intelligence have led to rapid growth in the
Internet of Things (IoT) as part of various smart initiatives. Embedded IoT microcontrollers …
Internet of Things (IoT) as part of various smart initiatives. Embedded IoT microcontrollers …