Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey

M Humayun, N Tariq, M Alfayad, M Zakwan… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has revolutionized various domains, enabling interconnected
devices to communicate and exchange data. The integration of Artificial Intelligence (AI) in …

A lightweight optimized intrusion detection system using machine learning for edge-based IIoT security

RS Tiwari, D Lakshmi, TK Das, AK Tripathy… - Telecommunication …, 2024 - Springer
Abstract The Industrial Internet of Things (IIoT) attributes to intelligent sensors and actuators
for better manufacturing and industrial operations. At the same time, IIoT devices must be …

Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity

MIM Yusop, NH Kamarudin, NHS Suhaimi… - IEEE …, 2025 - ieeexplore.ieee.org
As reliance on digital services grows, traditional password-based authentication methods
have been increasingly scrutinized due to their susceptibility to cyber-attacks, including …

Adopting artificial intelligence in ITIL for information security management—way forward in industry 4.0

M Rajagopal, S Ramkumar - Artificial Intelligence and Cyber Security in …, 2023 - Springer
To help prevent, detect, and resolve security-related problems within a company, AI must be
deployed. Industry 4.0 hopes to significantly improve information security by bringing forth …

Saila: Human Interface Device (HID) Injection Protection with Smart Phone based Passwordless Security

A Ghosh, A Mitra, SS Chakkaravarathy… - 2024 IEEE 44th …, 2024 - ieeexplore.ieee.org
The necessity for data protection is growing rapidly due to the increase in different kinds of
attacks on information security systems. Standard computers and data processing machines …

TUSH-Key: Transferable User Secrets on Hardware Key

A Mitra, A Ghosh, SC Sethuraman - arxiv preprint arxiv:2307.07484, 2023 - arxiv.org
Passwordless authentication was first tested for seamless and secure merchant payments
without the use of passwords or pins. It opened a whole new world of authentications giving …

TUSH-Key: Transferable User Secrets on Hardware Key

SC Sethuraman, A Mitra, A Ghosh… - 2024 IEEE 30th …, 2024 - ieeexplore.ieee.org
Passwordless authentication has revolutionized secure merchant payments, discarding
reliance on passwords and PINs. Utilizing W3C Web Authentication (WebAuthn) and Client …

Harmonizing Private Key Security and Ethereum Account System Flexibility: A FIDO2 and AA-Based Cryptocurrency Wallet

D Jung, B Kim, J Lee - Journal of the Korea Institute of Information …, 2024 - koreascience.kr
This study proposes a novel model to address the security, usability, and scalability
challenges of cryptocurrency wallets. The model is implemented as a web application that …

Sistem Keamanan Kotak Paket Cerdas Berbasis IoT dengan Teknologi MQTT

D Sasmoko, R Veliyanti, SA Wijayanto - LogicLink, 2024 - e-journal.uingusdur.ac.id
MQTT protocol is used by smart package box security systems based on the Internet of
Things (IoT) to ensure the security and speed of package delivery. This system uses ESP32 …