RPL-based attack detection approaches in IoT networks: review and taxonomy
Abstract The Routing Protocol for Low-Power and Lossy Networks (RPL) plays a crucial role
in the Internet of Things (IoT) and Wireless Sensor Networks. However, ensuring the RPL …
in the Internet of Things (IoT) and Wireless Sensor Networks. However, ensuring the RPL …
An overview of webassembly for iot: Background, tools, state-of-the-art, challenges, and future directions
This paper explores the relationship between two emerging technologies, WebAssembly
(Wasm) and the Internet of Things (IoT). It examines the complementary roles of these …
(Wasm) and the Internet of Things (IoT). It examines the complementary roles of these …
Contextual remediations prioritization system designed to implement theoretical principles of CVSS v4
Technological advancements have led to an unprecedented expansion in the number and
complexity of device interconnections. This brisk pace of adoption, while indicative of …
complexity of device interconnections. This brisk pace of adoption, while indicative of …
Securing smart home iot systems with attribute-based access control
Over the last few years, there has been an increased proliferation of IoT systems for smart
homes, enabling owners to remotely manage a variety of devices and gadgets installed on …
homes, enabling owners to remotely manage a variety of devices and gadgets installed on …
Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy
The internet of things (IoT) is an emerging technological advancement with significant
implications. It connects a wireless sensor or node network via low-power and lossy …
implications. It connects a wireless sensor or node network via low-power and lossy …
Intelligent IoT Systems: security issues, attacks, and countermeasures
The Internet of things (IoT) growth has created a large spectrum of heterogeneous devices
where these devices produce a considerable amount of data every second. The produced …
where these devices produce a considerable amount of data every second. The produced …
[PDF][PDF] Considering webassembly containers for edge computing on hardware-constrained iot devices
J Napieralla - 2020 - diva-portal.org
Background. Container technologies allow us to make our code portable enough to run
properly and independently irrespective of the hardware architecture or operative system …
properly and independently irrespective of the hardware architecture or operative system …
Congestion control model for securing internet of things data flow
Due to enormous amount of data in emerging Internet of Things (IoT) applications,
congestion control of traffic flow is very important to achieve certain level of security and …
congestion control of traffic flow is very important to achieve certain level of security and …
[PDF][PDF] Emerging technology IoT and OT: overview, security threats, attacks and countermeasures
Things (IoT) and Operational Technology (OT) with an emphasis on major security
challenges and attacks faced by these technologies. With increased deployment of IoT and …
challenges and attacks faced by these technologies. With increased deployment of IoT and …
Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications
The medical data generated from the patients that are communicated and stored on servers
are highly sensitive, and also the IoMT network creates open spaces for an adversary. The …
are highly sensitive, and also the IoMT network creates open spaces for an adversary. The …