Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing

S Cherbal, A Zier, S Hebal, L Louail… - The Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …

[HTML][HTML] Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions

D Javeed, MS Saeed, I Ahmad, M Adil, P Kumar… - Future Generation …, 2024 - Elsevier
Abstract The Internet of Things (IoT) has revolutionized various sectors by enabling
seamless device interaction. However, the proliferation of IoT devices has also raised …

[HTML][HTML] TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks

S Ullah, J Ahmad, MA Khan, MS Alshehri, W Boulila… - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a global network that connects a large number of
smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to …

A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects

T Shakeel, S Habib, W Boulila, A Koubaa… - Complex & intelligent …, 2023 - Springer
Extensive research has been conducted on healthcare technology and service
advancements during the last decade. The Internet of Medical Things (IoMT) has …

A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions

O Ceviz, S Sen, P Sadioglu - IEEE Communications Surveys & …, 2024 - ieeexplore.ieee.org
Thanks to the rapidly develo** technology, unmanned aerial vehicles (UAVs) are able to
complete a number of tasks in cooperation with each other without need for human …

A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security

AE Adeniyi, RG Jimoh, JB Awotunde - Computers and Electrical …, 2024 - Elsevier
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …

A comprehensive guide to CAN IDS data and introduction of the ROAD dataset

ME Verma, RA Bridges, MD Iannacone, SC Hollifield… - PLoS one, 2024 - journals.plos.org
Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic
security properties and are easily exploitable. A rapidly growing field of CAN security …

Security in the internet of things application layer: requirements, threats, and solutions

M Abbasi, M Plaza-Hernandez, J Prieto… - IEEE …, 2022 - ieeexplore.ieee.org
Communication systems and networks are evolving as an integral part of not only of our
everyday life but also as a part of the industry, fundamental infrastructures, companies, etc …

[HTML][HTML] Health IoT Threats: Survey of Risks and Vulnerabilities

S Madanian, T Chinbat, M Subasinghage, D Airehrour… - Future Internet, 2024 - mdpi.com
The secure and efficient collection of patients' vital information is a challenge faced by the
healthcare industry. Through the adoption and application of Internet of Things (IoT), the …

Efficient and secured mechanisms for data link in IoT WSNs: A literature review

MZ Hasan, Z Mohd Hanapi - Electronics, 2023 - mdpi.com
The Internet of things (IoT) and wireless sensor networks (WSNs) have been rapidly and
tremendously develo** recently as computing technologies have brought about a …