From industry 4.0 to agriculture 4.0: Current status, enabling technologies, and research challenges

Y Liu, X Ma, L Shu, GP Hancke… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The three previous industrial revolutions profoundly transformed agriculture industry from
indigenous farming to mechanized farming and recent precision agriculture. Industrial …

How machine learning changes the nature of cyberattacks on IoT networks: A survey

E Bout, V Loscri, A Gallais - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has continued gaining in popularity and importance in everyday
life in recent years. However, this development does not only present advantages. Indeed …

Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

A Attkan, V Ranga - Complex & Intelligent Systems, 2022 - Springer
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …

A review of security and privacy concerns in the internet of things (IoT)

M Aqeel, F Ali, MW Iqbal, TA Rana, M Arif… - Journal of …, 2022 - Wiley Online Library
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …

Svm-based cloning and jamming attack detection in iot sensor networks

M Jeyaselvi, M Sathya, S Suchitra… - Advances in Information …, 2022 - Springer
Internet of things (IoT) devices are susceptible to numerous safety intimidations because of
their limited features and abilities. In IoT, the wireless communications are generally shown …

Non-functional requirements elicitation for edge computing

S Gupta - Internet of Things, 2022 - Elsevier
The proliferation of the Internet of Things (IoT) devices and advances in their computing
capabilities give an impetus to the Edge Computing (EC) paradigm that can facilitate …

Security audit of a blockchain-based industrial application platform

J Stodt, D Schönle, C Reich, F Ghovanlooy Ghajar… - Algorithms, 2021 - mdpi.com
In recent years, both the Internet of Things (IoT) and blockchain technologies have been
highly influential and revolutionary. IoT enables companies to embrace Industry 4.0, the …

Attack categorisation for IoT applications in critical infrastructures, a survey

E Staddon, V Loscri, N Mitton - applied sciences, 2021 - mdpi.com
With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the
number of attack possibilities increases. Furthermore, with the incorporation of the IoT into …

Reliability of linear WSNs: A complementary overview and analysis of impact of cascaded failures on network lifetime

MF Carsancakli, MA Al Imran, HU Yildiz, A Kara, B Tavli - Ad Hoc Networks, 2022 - Elsevier
Abstract Linear Wireless Sensor Networks (LWSNs) are used in applications where
deployment scenarios necessitate sensor nodes to be placed over a line topology. However …

Security and privacy of smart waste management systems: a cyber-physical system perspective

A Brighente, M Conti, G Di Renzone… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Smart waste management systems (SWMSs) represent a fundamental technology to
efficiently manage the waste management and disposal process. Indeed, they provide …