Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …
significant attention from the research community. To this end, several surveys were put …
A survey on emerging SDN and NFV security mechanisms for IoT systems
I Farris, T Taleb, Y Khettab… - … Communications Surveys & …, 2018 - ieeexplore.ieee.org
The explosive rise of Internet of Things (IoT) systems have notably increased the potential
attack surfaces for cybercriminals. Accounting for the features and constraints of IoT devices …
attack surfaces for cybercriminals. Accounting for the features and constraints of IoT devices …
Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …
State-of-the-art survey of artificial intelligent techniques for IoT security
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …
innovation community's considerable attention. Several surveys have covered different IoT …
IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge
IoT devices are notoriously vulnerable even to trivial attacks and can be easily
compromised. In addition, resource constraints and heterogeneity of IoT devices make it …
compromised. In addition, resource constraints and heterogeneity of IoT devices make it …
Enhancing IoT security through network softwarization and virtual security appliances
Summary Billions of Internet of Things (IoT) devices are expected to populate our
environments and provide novel pervasive services by interconnecting the physical and …
environments and provide novel pervasive services by interconnecting the physical and …
Internet of things: A scientometric review
Internet of Things (IoT) is connecting billions of devices to the Internet. These IoT devices
chain sensing, computation, and communication techniques, which facilitates remote data …
chain sensing, computation, and communication techniques, which facilitates remote data …
Top 12 layer-wise security challenges and a secure architectural solution for Internet of Things
SNG Aryavalli, H Kumar - Computers and Electrical Engineering, 2023 - Elsevier
Digitalization, intelligent virtual assistants, and smart consumer products prepare us for life
at every stage. Smart IoT, Sensor nodes, software communicate with one another via voice …
at every stage. Smart IoT, Sensor nodes, software communicate with one another via voice …
Ethical hacking for boosting IoT vulnerability management: A first look into bug bounty programs and responsible disclosure
The security of the Internet of Things (IoT) has attracted much attention due to the growing
number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities …
number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities …
Connecting the Dots: Tracing Data Endpoints in IoT Devices
Smart home devices are constantly exchanging data with a variety of remote endpoints. This
data encompasses diverse information, from device operation and status to sensitive user …
data encompasses diverse information, from device operation and status to sensitive user …