Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
Securing blockchain-based IoT systems: A review
This paper reviews the role of blockchain technology in enhancing the security of Internet of
Things (IoT) systems and maintaining data integrity. We address the increased …
Things (IoT) systems and maintaining data integrity. We address the increased …
Securing social platform from misinformation using deep learning
People are easily duped by fake news and start to share it on their networks. With high
frequency, fake news causes panic and forces people to engage in unethical behavior such …
frequency, fake news causes panic and forces people to engage in unethical behavior such …
UAV-assisted secure uplink communications in satellite-supported IoT: Secrecy fairness approach
The escalating growth of the Internet of Things (IoT) has intensified the demand for
dependable and efficient communication networks to accommodate the massive data …
dependable and efficient communication networks to accommodate the massive data …
Layer-based examination of cyber-attacks in IoT
The Internet of Things (IoT) is a network of millions of smart devices and sensors connected
to a network. These devices are used in smart cities, public transportation, smart grids and …
to a network. These devices are used in smart cities, public transportation, smart grids and …
Soteria: A quantum-based device attestation technique for the Internet of Things
The number of the Internet of Things (IoT) devices is growing at a rapid pace. Although the
IoT has and continues to enable many new and exciting applications, recent studies show …
IoT has and continues to enable many new and exciting applications, recent studies show …
[HTML][HTML] AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance
A Khurshid, S Raza - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things (IoT) network is comprised of heterogeneous devices which
are part of critical infrastructures throughout the world. To enable end-to-end security, the …
are part of critical infrastructures throughout the world. To enable end-to-end security, the …
Towards remotely verifiable software integrity in resource-constrained iot devices
Lower-end IoT devices typically have strict cost constraints that rule out usual security
mechanisms available in general-purpose computers or higher-end devices. To secure low …
mechanisms available in general-purpose computers or higher-end devices. To secure low …
FeSA: Automatic federated swarm attestation on dynamic large-scale iot devices
Swarm attestation, as an important branch of Remote Attestation (RA), enables a trusted
party (verifier) to verify the security states of multiple devices (provers) in a large network …
party (verifier) to verify the security states of multiple devices (provers) in a large network …
Fortified-grid: Fortifying smart grids through the integration of the trusted platform module in internet of things devices
This paper presents a hardware-assisted security primitive that integrates the Trusted
Platform Module (TPM) into IoT devices for authentication in smart grids. Data and device …
Platform Module (TPM) into IoT devices for authentication in smart grids. Data and device …