Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019‏ - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

[HTML][HTML] Biometrics for internet-of-things security: A review

W Yang, S Wang, NM Sahri, NM Karie, M Ahmed… - Sensors, 2021‏ - mdpi.com
The large number of Internet-of-Things (IoT) devices that need interaction between smart
devices and consumers makes security critical to an IoT environment. Biometrics offers an …

A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care

M Masud, GS Gaba, S Alqahtani… - IEEE Internet of …, 2020‏ - ieeexplore.ieee.org
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022‏ - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

End-to-end encryption in resource-constrained IoT device

ASD Alluhaidan, P Prabu - IEEE access, 2023‏ - ieeexplore.ieee.org
Internet of Things (IoT) technologies will interconnect with a wide range of network devices,
regardless of their local network and resource capacities. Ensuring the security …

Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017‏ - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

A secure IoT sensors communication in industry 4.0 using blockchain technology

G Rathee, M Balasaraswathi, KP Chandran… - Journal of Ambient …, 2021‏ - Springer
Industrial IoT in the advancement of organizations consigns to the next level in order to trace
and manage every single activity of their entities. However, the interdependence …

A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography

HA Al Hamid, SMM Rahman, MS Hossain… - IEEE …, 2017‏ - ieeexplore.ieee.org
Nowadays, telemedicine is an emerging healthcare service where the healthcare
professionals can diagnose, evaluate, and treat a patient using telecommunication …

Industrial internet of things ecosystems security and digital forensics: achievements, open challenges, and future directions

VR Kebande, AI Awad - ACM Computing Surveys, 2024‏ - dl.acm.org
The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0
revolution, which is projected to continue accelerating and realizing digital transformations …

A comprehensive review on blockchain and Internet of Things in healthcare

A Sharma, S Kaur, M Singh - Transactions on Emerging …, 2021‏ - Wiley Online Library
Blockchain Technology, the fundamental technology behind Bitcoin, has drawn
considerable recognition ever since its origin. Its potential has gained significant interest in …