Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

A survey on emerging SDN and NFV security mechanisms for IoT systems

I Farris, T Taleb, Y Khettab… - … Communications Surveys & …, 2018 - ieeexplore.ieee.org
The explosive rise of Internet of Things (IoT) systems have notably increased the potential
attack surfaces for cybercriminals. Accounting for the features and constraints of IoT devices …

Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge

I Hafeez, M Antikainen, AY Ding… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
IoT devices are notoriously vulnerable even to trivial attacks and can be easily
compromised. In addition, resource constraints and heterogeneity of IoT devices make it …

Enhancing IoT security through network softwarization and virtual security appliances

A Molina Zarca, J Bernal Bernabe… - … Journal of Network …, 2018 - Wiley Online Library
Summary Billions of Internet of Things (IoT) devices are expected to populate our
environments and provide novel pervasive services by interconnecting the physical and …

Internet of things: A scientometric review

J Ruiz-Rosero, G Ramirez-Gonzalez, JM Williams… - Symmetry, 2017 - mdpi.com
Internet of Things (IoT) is connecting billions of devices to the Internet. These IoT devices
chain sensing, computation, and communication techniques, which facilitates remote data …

Top 12 layer-wise security challenges and a secure architectural solution for Internet of Things

SNG Aryavalli, H Kumar - Computers and Electrical Engineering, 2023 - Elsevier
Digitalization, intelligent virtual assistants, and smart consumer products prepare us for life
at every stage. Smart IoT, Sensor nodes, software communicate with one another via voice …

Ethical hacking for boosting IoT vulnerability management: A first look into bug bounty programs and responsible disclosure

AY Ding, GL De Jesus, M Janssen - Proceedings of the Eighth …, 2019 - dl.acm.org
The security of the Internet of Things (IoT) has attracted much attention due to the growing
number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities …

Connecting the Dots: Tracing Data Endpoints in IoT Devices

M Jakaria, DY Huang, A Das - Proceedings on Privacy …, 2024 - petsymposium.org
Smart home devices are constantly exchanging data with a variety of remote endpoints. This
data encompasses diverse information, from device operation and status to sensitive user …