Security analysis of IoT devices by using mobile computing: a systematic literature review

B Liao, Y Ali, S Nazir, L He, HU Khan - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices are operating in various domains like healthcare
environment, smart cities, smart homes, transportation, and smart grid system. These …

Security in Internet of Things: A review

NA Khan, A Awang, SAA Karim - IEEE access, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is the paramount virtual network that enables remote users to access
connected multimedia devices. It has dragged the attention of the community because it …

A novel data poisoning attack in federated learning based on inverted loss function

P Gupta, K Yadav, BB Gupta, M Alazab… - Computers & …, 2023 - Elsevier
Data poisoning attack is one of the common attacks that decreases the performance of a
model in edge machine learning. The mechanism used in most of the existing data …

Classification Techniques for Arrhythmia Patterns Using Convolutional Neural Networks and Internet of Things (IoT) Devices

MO Agyeman, AF Guerrero, QT Vien - IEEE access, 2022 - ieeexplore.ieee.org
The rise of Telemedicine has revolutionized how patients are being treated, leading to
several advantages such as enhanced health analysis tools, accessible remote healthcare …

[HTML][HTML] An analysis of cybersecurity attacks against internet of things and security solutions

MR Islam, KM Aktheruzzaman - Journal of Computer and …, 2020 - scirp.org
Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps
billion of devices to connect to the internet so that they can exchange data with each other …

IoT security challenges in cloud environment

A Bonkra, P Dhiman - … on computational methods in science & …, 2021 - ieeexplore.ieee.org
IoT plays a critical role in every industry, from homes to retail. The internet of things was first
established in 1998, and since then, it has become a term in every profession. Smart …

Fpga based light weight encryption of medical data for iomt devices using ascon cipher

K Raj, S Bodapati - 2022 IEEE International Symposium on …, 2022 - ieeexplore.ieee.org
Internet of Things applications with various sensors in public network are vulnerable to cyber
physical attacks. The technology of IoT in smart health monitoring systems popularly known …

Design and implementation of an IoT-based energy monitoring system for managing smart homes

MO Agyeman, Z Al-Waisi… - 2019 Fourth International …, 2019 - ieeexplore.ieee.org
The usage of smart meters has been expanding rapidly since the 2000s, as they provide
economic, social and environmental benefits for multiple stakeholders. A smart meter can …

Improved Generic Layer Model for IoT Architecture.

P Pukkasenung… - Journal of Information …, 2021 - search.ebscohost.com
The internet of things (IoT) has the potential to create massive disruptions in
telecommunications, cable broadband, cloud computing, and the architecture of related IoT …

A low-cost secure IoT mechanism for monitoring and controlling polygeneration microgrids

J Martínez-Martínez, D Aponte-Roa… - Applied Sciences, 2020 - mdpi.com
The use of Internet-connected devices at homes has increased to monitor energy
consumption. Furthermore, renewable energy sources have also increased, reducing …