A survey of public IoT datasets for network security research
F De Keersmaeker, Y Cao… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Publicly available datasets are an indispensable tool for researchers, as they allow testing
new algorithms on a wide range of different scenarios and making scientific experiments …
new algorithms on a wide range of different scenarios and making scientific experiments …
Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies
The Internet of Things (IoT) is a collection of devices such as sensors for collecting data,
actuators that perform mechanical actions on the sensor's collected data, and gateways …
actuators that perform mechanical actions on the sensor's collected data, and gateways …
Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures
Although the Internet of Things (IoT) incorporates millions of heterogeneous devices to
provide advanced intelligent services and has greatly impacted our lives over time, it has a …
provide advanced intelligent services and has greatly impacted our lives over time, it has a …
A lightweight mitigation approach against a new inundation attack in RPL-based IoT networks
Internet of Things (IoT) networks are being widely deployed for a broad range of critical
applications. Without effective security support, such a trend would open the doors to …
applications. Without effective security support, such a trend would open the doors to …
Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data
RW Wardhani, DSC Putranto, U Jo, H Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Securing the Internet of Things (IoT) against cyber threats is a formidable challenge, and
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …
Easychain: an iot-friendly blockchain for robust and energy-efficient authentication
The Internet of Everything (IoE) is a bigger picture that tries to fit the Internet of Things (IoT)
that is widely deployed in smart applications. IoE brings people, data, processes, and things …
that is widely deployed in smart applications. IoE brings people, data, processes, and things …
[PDF][PDF] Security challenges: M2M communication in IoT
In recent times, smart devices, smart homes, smart manufacturing, and even smart cities, all
of which are connected to the Internet of Things (IoT) have become quite common. IoT …
of which are connected to the Internet of Things (IoT) have become quite common. IoT …
Methodology for Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security
VV Vegesna - Asian Journal of Basic Science & Research, 2023 - papers.ssrn.com
Instead of depending on a technology's apparently positive qualities, we always have made
it a priority to first examine its flaws. In addition to individuals and robots, now there are …
it a priority to first examine its flaws. In addition to individuals and robots, now there are …
Security Trends in Internet-of-things for Ambient Assistive Living: A Review
The Internet of Things (IoT) has revolutionized our society and become indispensable to
modern existence. The IoT allows users to access their electronic gadgets from any location …
modern existence. The IoT allows users to access their electronic gadgets from any location …
A review on fog computing for the internet of things
Today Internet of Things (IoT) is being used in almost every field and it's growing very
rapidly. Along with its growth challenges and complications are also increasing. Classic …
rapidly. Along with its growth challenges and complications are also increasing. Classic …