[HTML][HTML] Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022‏ - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems

E Benkhelifa, T Welsh… - … communications surveys & …, 2018‏ - ieeexplore.ieee.org
The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous
nature of devices and protocols in use, the sensitivity of the data contained within, as well as …

Cyber attacks on smart farming infrastructure

S Sontowski, M Gupta, SSL Chukkapalli… - 2020 IEEE 6th …, 2020‏ - ieeexplore.ieee.org
Smart farming also known as precision agriculture is gaining more traction for its promising
potential to fulfill increasing global food demand and supply. In a smart farm, technologies …

Cloud computing security: a taxonomy, threat detection and mitigation techniques

P Rani, S Singh, K Singh - International Journal of Computers and …, 2024‏ - Taylor & Francis
Cloud Computing is a rapidly growing emerging technology in the IT environment. Internet-
based computing provides services like sharing resources eg network, storage, applications …

Stealing complex network attack detection method considering security situation awareness

B **, H Liu, B Hou, Y Wang, Y Guo - Plos one, 2024‏ - journals.plos.org
Tracking and detection have brought great challenges to network security. Therefore, this
paper proposes a monitoring method of stealthy complex network attacks considering …

[PDF][PDF] Improved identity based encryption system (Iibes): A mechanism for eliminating the key-escrow problem

M Patel, R Patel - Emerging Science Journal, 2021‏ - academia.edu
A revolutionary change to public-key cryptography can be considered as an Identity Based
Cryptography (IBC) in which identity of the receiver is being used as a public key for …

Cyber threat migration: Perpetuating in the healthcare sector and agriculture and food industries

MA Usmani, KA Usmani, A Kaleem… - Advances in Cyberology …, 2023‏ - igi-global.com
Abstract 'Globalization,''industrialization,''cyber connectivity,''digitalization,'and 'e-
commerce'are not fantasy words in today's era. They all amalgamated towards the growth …

Tracking intruders in IoT networks by means of DNS traffic analysis

TL von Sperling, FL de Caldas Filho… - 2017 Workshop on …, 2017‏ - ieeexplore.ieee.org
The Internet of Things is increasingly gaining use in our society as can be seen by the
significant growth in the number of devices connected to the most diverse Internet …

Unveiling DNS Spoofing Vulnerabilities: An Ethical Examination Within Local Area Networks

A Jony, MN Islam, IH Sarker - 2023 26th International …, 2023‏ - ieeexplore.ieee.org
Nowadays DNS spoofing has become one of the terrible attacks which is triggered by
exploiting IP address conflict detection vulnerability on the DHCP server side. DHCP server …

An optimized machine learning model for the detection of man-in-the-middle attack in mobile edge computing

RL Moila, M Velempini - 2024 IST-Africa Conference (IST …, 2024‏ - ieeexplore.ieee.org
Edge computing has gained significance in processing data near the source. However, its
distributed and resource-constrained nature is prone to security challenges, particularly the …