Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
Abstract Internet of Things (IoT) is one of the most rapidly used technologies in the last
decade in various applications. The smart things are connected in wireless or wired for …
decade in various applications. The smart things are connected in wireless or wired for …
Complementing IoT services through software defined networking and edge computing: A comprehensive survey
Millions of sensors continuously produce and transmit data to control real-world
infrastructures using complex networks in the Internet of Things (IoT). However, IoT devices …
infrastructures using complex networks in the Internet of Things (IoT). However, IoT devices …
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …
offering various applications for human benefit. Advances in embedded system architecture …
A survey on internet of things: Applications, recent issues, attacks, and security mechanisms
The Internet of Things (IoT) is a series of recording devices, mechanical and automated
machines, documents, creatures, or individuals that have one of the user identifiers and the …
machines, documents, creatures, or individuals that have one of the user identifiers and the …
A review of security and privacy concerns in the internet of things (IoT)
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …
applications. There are more than 50 billion devices connected globally. IoT applications' …
A supervised machine learning-based solution for efficient network intrusion detection using ensemble learning based on hyperparameter optimization
An efficient machine learning (ML) ensemble technique for categorizing Intrusion Detection
(ID) is proposed in this study. The tuning of the ML model's parameters is a critical topic …
(ID) is proposed in this study. The tuning of the ML model's parameters is a critical topic …
[HTML][HTML] The evolution of Mirai botnet scans over a six-year period
The proliferation of Internet of Things devices has resulted in an increase in security
vulnerabilities and network attacks. The Mirai botnet is a well-known example of a network …
vulnerabilities and network attacks. The Mirai botnet is a well-known example of a network …
Climate‐smart agriculture using intelligent techniques, blockchain and Internet of Things: Concepts, challenges, and opportunities
Abstract The Internet of Things (IoT) is an important technology that provides efficient and
dependable solutions in a variety of domains, such as smart agriculture and climatic change …
dependable solutions in a variety of domains, such as smart agriculture and climatic change …
Multi-adaptive routing protocol for internet of things based ad-hoc networks
Abstract Internet of Things (IoT) based applications are being evolved in multiple fields to
provide enhanced service to the world. IoT is a recent computing concept interconnecting …
provide enhanced service to the world. IoT is a recent computing concept interconnecting …
CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities
This research aims to represent a novel approach to detect malicious nodes in Ad-hoc On-
demand Distance Vector (AODV) within the next-generation smart cities. Smart city …
demand Distance Vector (AODV) within the next-generation smart cities. Smart city …