Security analysis of IoT devices by using mobile computing: a systematic literature review

B Liao, Y Ali, S Nazir, L He, HU Khan - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices are operating in various domains like healthcare
environment, smart cities, smart homes, transportation, and smart grid system. These …

Security of IoT application layer protocols: Challenges and findings

G Nebbione, MC Calzarossa - Future Internet, 2020 - mdpi.com
IoT technologies are becoming pervasive in public and private sectors and represent
presently an integral part of our daily life. The advantages offered by these technologies are …

Classifying IoT devices in smart environments using network traffic characteristics

A Sivanathan, HH Gharakheili, F Loi… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is being hailed as the next wave revolutionizing our society, and
smart homes, enterprises, and cities are increasingly being equipped with a plethora of IoT …

Information exposure from consumer iot devices: A multidimensional, network-informed measurement approach

J Ren, DJ Dubois, D Choffnes, AM Mandalari… - Proceedings of the …, 2019 - dl.acm.org
Internet of Things (IoT) devices are increasingly found in everyday homes, providing useful
functionality for devices such as TVs, smart speakers, and video doorbells. Along with their …

Machine learning for the detection and identification of Internet of Things devices: A survey

Y Liu, J Wang, J Li, S Niu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming an indispensable part of everyday life, enabling a
variety of emerging services and applications. However, the presence of rogue IoT devices …

Detecting volumetric attacks on lot devices via sdn-based monitoring of mud activity

A Hamza, HH Gharakheili, TA Benson… - Proceedings of the 2019 …, 2019 - dl.acm.org
Smart environments equipped with IoT devices are increasingly under threat from an
escalating number of sophisticated cyber-attacks. Current security approaches are …

ML-DDoS: A blockchain-based multilevel DDoS mitigation mechanism for IoT environments

RF Hayat, S Aurangzeb, M Aleem… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks as well as botnet-based attacks are among the
most important security vulnerabilities in Internet of Things (IoT) environments. Most of the …

Recent technologies, security countermeasure and ongoing challenges of Industrial Internet of Things (IIoT): A survey

SF Tan, A Samsudin - Sensors, 2021 - mdpi.com
The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security
and privacy issues becoming critically challenging. Numerous surveys have been published …

Watching you watch: The tracking ecosystem of over-the-top tv streaming devices

H Mohajeri Moghaddam, G Acar, B Burgess… - Proceedings of the …, 2019 - dl.acm.org
The number of Internet-connected TV devices has grown significantly in recent years,
especially Over-the-Top (" OTT") streaming devices, such as Roku TV and Amazon Fire TV …

Blockchain-based authentication and explainable AI for securing consumer IoT applications

R Kumar, D Javeed, A Aljuhani, A Jolfaei… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The consumer Internet of Things (IoT) applications in particular smart cities are mostly
equipped with Internet-connected networked devices to improve city operations by giving …