Current research trends in IoT security: a systematic map** study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

Reliable and resilient AI and IoT-based personalised healthcare services: A survey

N Taimoor, S Rehman - IEEE Access, 2021 - ieeexplore.ieee.org
Recent technological (eg, IoT, 5G), and economic (eg, UN 2030 Sustainable Development
Goals) developments have transformed the healthcare sector towards more personalized …

Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues

SS Mahadik, PM Pawar, R Muthalagu - Multimedia Tools and Applications, 2024 - Springer
The HetIoT is a new emergent technology widely used to offer QoS to applications such as
health monitoring systems, agriculture 4.0, traffic monitoring, industry 4.0, and civil defense …

Studying Imbalanced Learning for Anomaly-Based Intelligent IDS for Mission-Critical Internet of Things

G Abdelmoumin, DB Rawat, A Rahman - Journal of Cybersecurity and …, 2023 - mdpi.com
Training-anomaly-based, machine-learning-based, intrusion detection systems (AMiDS) for
use in critical Internet of Things (CioT) systems and military Internet of Things (MioT) …

Improve cloud based iot architecture layer security-a literature review

N Kashyap, A Rana, V Kansal… - … , and Intelligent Systems …, 2021 - ieeexplore.ieee.org
The Internet of Things is used in number of areas for convenience in everyday life. The
Internet of Thing is in the need of an advanced environment for security. Internet of Thing …

Detection and mitigation of man-in-the-middle attack in iot through alternate routing

K Saritha, V Sarasvathi, A Singh… - 2022 6th …, 2022 - ieeexplore.ieee.org
The Internet of Things has grown to great heights in recent years. More and more devices
are being connected to the Internet and the data from these IoT devices is used in decision …

A study of RPL attacks and defense mechanisms in the internet of things network

A Dhingra, V Sindhu - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is a technology that has evolved to make day-to-day life faster
and easier. But with the increase in the number of users, the IoT network is prone to various …

[PDF][PDF] Securing smart agriculture: proposed hybrid meta-model and certificate-based cyber security approaches

K Taji, B Elkhalyly, YT Ahmad, I Ghanimi… - Data and …, 2023 - pdfs.semanticscholar.org
ABSTRACT The Internet of Things is a decentralized network of physically connected
devices that communicate with other systems and devices over the internet. As the number …

Cyber Security in the Indian Electricity Distribution System: A Review

PK Jha, F Teotia, AK Saxena - 2023 5th International …, 2023 - ieeexplore.ieee.org
Utilities are adopting automation in power systems to ensure reliability of power in
Automated Active Distribution Network (AADN) and to meet the exponential increase in …

[PDF][PDF] Survey on Security Issues and Protective Measures in Different Layers of Internet of Things (IoT)

R Jena, AK Biswal, A Lenka - … Journal of Smart Sensor and Adhoc …, 2022 - researchgate.net
In general perspective, Internet of things is defined as a network of physical objects by
connecting” things to things” through the sensors, actuators and processors, to communicate …