Digital twin: A comprehensive survey of security threats

C Alcaraz, J Lopez - IEEE Communications Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …

[HTML][HTML] Landscape of IoT security

E Schiller, A Aidoo, J Fuhrer, J Stahl, M Ziörjen… - Computer Science …, 2022 - Elsevier
The last two decades have experienced a steady rise in the production and deployment of
sensing-and-connectivity-enabled electronic devices, replacing “regular” physical objects …

Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road toward 6G

M Vaezi, A Azari, SR Khosravirad… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The next wave of wireless technologies is proliferating in connecting things among
themselves as well as to humans. In the era of the Internet of Things (IoT), billions of …

Federated-learning-based anomaly detection for IoT security attacks

V Mothukuri, P Khare, RM Parizi… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is made up of billions of physical devices connected to the
Internet via networks that perform tasks independently with less human intervention. Such …

A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT

FS Gharehchopogh, B Abdollahzadeh, S Barshandeh… - Internet of Things, 2023 - Elsevier
The increasing trend toward using the Internet of Things (IoT) increased the number of
intrusions and intruders annually. Hence, the integration, confidentiality, and access to …

Survey on network slicing for Internet of Things realization in 5G networks

S Wijethilaka, M Liyanage - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging technology that makes people's lives smart by
conquering a plethora of diverse application and service areas. In near future, the fifth …

Federated deep learning for zero-day botnet attack detection in IoT-edge devices

SI Popoola, R Ande, B Adebisi, G Gui… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Deep learning (DL) has been widely proposed for botnet attack detection in Internet of
Things (IoT) networks. However, the traditional centralized DL (CDL) method cannot be …

Securing the IoT application layer from an MQTT protocol perspective: Challenges and research prospects

S Lakshminarayana, A Praseed… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most promising new millennial technologies, having
numerous applications in our surrounding environment. The fundamental goal of an IoT …

Embedding blockchain technology into IoT for security: A survey

L Da Xu, Y Lu, L Li - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In recent years, the Internet of Things (IoT) has made great progress. The interconnection
between IoT and the Internet enables real-time information processing and transaction …

An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT

A Shahidinejad, J Abawajy - ACM Computing Surveys, 2024 - dl.acm.org
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …