Journal articles on the topic 'Iot security solutions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Iot security solutions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kotaiah, Dharavath, and Chitti Ravi Kiran. "Network Security Key Areas of IoT and IIOT- with Connected Devices Privacy and Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 2076–82. http://dx.doi.org/10.22214/ijraset.2023.49873.
Full textAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (2021): 3654. http://dx.doi.org/10.3390/s21113654.
Full textМинаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.
Full textChen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 36–41. https://doi.org/10.5281/zenodo.12789562.
Full textSonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.
Full textRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.
Full textKuraś, Paweł, Patryk Organiściak, Bartosz Kowal, et al. "IOT COMMUNICATION SECURITY: CHALLENGES AND SOLUTIONS." Zeszyty Naukowe SGSP 2, no. 88 (2024): 69–90. http://dx.doi.org/10.5604/01.3001.0054.3829.
Full textTawalbeh, Lo’ai, Fadi Muheidat, Mais Tawalbeh, and Muhannad Quwaider. "IoT Privacy and Security: Challenges and Solutions." Applied Sciences 10, no. 12 (2020): 4102. http://dx.doi.org/10.3390/app10124102.
Full textKrishna, Prasad K. "Securing the Internet of Things: A Comprehensive Analysis of Lightweight Cryptographic Approaches for Resource-Constrained Devices." International Journal of Information Technology Research Studies (IJITRS) 1, no. 1 (2025): 20–35. https://doi.org/10.5281/zenodo.15309858.
Full textKumar, Akshay, Kumar Gaurav, Edidiong, and Nitesh Kumar. "Security and Privacy for Internet of Things: Challenges and Solutions." JOURNAL OF INTELLIGENT SYSTEMS AND COMPUTING 6, no. 1 (2025): 12–22. https://doi.org/10.51682/jiscom.v6i1.68.
Full textFarooq, Muhammad Shoaib, Muhammad Abdullah, Shamyla Riaz, et al. "A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry." Sensors 23, no. 21 (2023): 8958. http://dx.doi.org/10.3390/s23218958.
Full textSoofi, Aized Amin, Muhammad Tahir, and Naeem Raza. "Securing the Internet of Things: A Comprehensive Review of Security Challenges and Artificial Intelligence Solutions." Foundation University Journal of Engineering and Applied Sciences <br><i style="color:black;">(HEC Recognized Y Category , ISSN 2706-7351)</i> 4, no. 2 (2024): 1–20. http://dx.doi.org/10.33897/fujeas.v4i2.779.
Full textHussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, et al. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment." Sensors 21, no. 9 (2021): 3025. http://dx.doi.org/10.3390/s21093025.
Full textToka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Full textCAZACU, Andrei-Robert. "IoT Security: Threats and Possible Solutions." Informatica Economica 26, no. 2/2022 (2022): 57–64. http://dx.doi.org/10.24818/issn14531305/26.2.2022.06.
Full textAlfahaid, Abdullah, Easa Alalwany, Abdulqader M. Almars, Fatemah Alharbi, Elsayed Atlam, and Imad Mahgoub. "Machine Learning-Based Security Solutions for IoT Networks: A Comprehensive Survey." Sensors 25, no. 11 (2025): 3341. https://doi.org/10.3390/s25113341.
Full textSebestyen, Hannelore, Daniela Elena Popescu, and Rodica Doina Zmaranda. "A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories." Computers 14, no. 2 (2025): 61. https://doi.org/10.3390/computers14020061.
Full textManoj, Reddy Kichaiah Gari. "Lightweight Security Solutions for IoT Devices in Cloud Ecosystems." Journal of Scientific and Engineering Research 11, no. 6 (2024): 168–72. https://doi.org/10.5281/zenodo.14715738.
Full textSharma, Ravi, and Nonita Sharma. "Attacks on Resource-Constrained IoT Devices and Security Solutions." International Journal of Software Science and Computational Intelligence 14, no. 1 (2022): 1–21. http://dx.doi.org/10.4018/ijssci.310943.
Full textM. S. Minu. "Enhancing IoT Security with Lightweight Cryptographic Operations Using Temporal Spatial Hyperdimensional Computing." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 138–49. https://doi.org/10.52783/jisem.v10i13s.2013.
Full textTiwari, Naman, Abhay Kumar Pandey, and Abhilash Kokala. "Challenges and Solutions for Countering Emerging Security Threats to IoT Devices." International Journal of Experimental Research and Review 47 (April 30, 2025): 59–68. https://doi.org/10.52756/ijerr.2025.v47.005.
Full textM. Sultan, Mohammed. "Securing the internet of things: challenges, strategies, and emerging trends in IoT Security Systems." International Journal of Research in Engineering and Innovation 07, no. 06 (2023): 266–73. http://dx.doi.org/10.36037/ijrei.2023.7607.
Full textPratik Shah,, Et al. "Designing and Executing Security Solutions for IoT-5G Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 903–9. http://dx.doi.org/10.17762/ijritcc.v11i9s.9714.
Full textAlotaibi, Bandar. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities." Sensors 23, no. 17 (2023): 7470. http://dx.doi.org/10.3390/s23177470.
Full textMashiya Afroze F and Dr. Jose Reena K. "A Survey Study on IoT Application and its Attacks." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 02 (2024): 80–86. http://dx.doi.org/10.47392/irjaeh.2024.0016.
Full textManoj, Reddy Kichaiah Gari. "Lightweight Security Solutions for IoT Devices in Cloud Ecosystems." Journal of Scientific and Engineering Research 11, no. 6 (2024): 168–72. https://doi.org/10.5281/zenodo.14710964.
Full textIBRAHIM ABDUL ABDULRAHMAN, GABRIEL TOSIN AYODELE, GRACE EFAHN EGBEDION, JACOB ALEBIOSU, EZEAGBA JETTA SOMTOCHUKWU, and OMOTOLANI ENIOLA AKINBOLAJO. "Securing Internet of Things (IoT) ecosystems: Addressing scalability, authentication, and privacy challenges." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 523–34. https://doi.org/10.30574/wjarr.2025.26.1.0999.
Full textDorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.
Full textBour, Guillaume, Camillo Bosco, Rita Ugarelli, and Martin Gilje Jaatun. "Water-Tight IoT–Just Add Security." Journal of Cybersecurity and Privacy 3, no. 1 (2023): 76–94. http://dx.doi.org/10.3390/jcp3010006.
Full textPapoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (2021): 1396. http://dx.doi.org/10.3390/app11041396.
Full textBalogh, Stefan, Ondrej Gallo, Roderik Ploszek, Peter Špaček, and Pavol Zajac. "IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques." Electronics 10, no. 21 (2021): 2647. http://dx.doi.org/10.3390/electronics10212647.
Full textVarga, Pal, Jozsef Peto, Attila Franko, et al. "5G support for Industrial IoT Applications— Challenges, Solutions, and Research gaps." Sensors 20, no. 3 (2020): 828. http://dx.doi.org/10.3390/s20030828.
Full textHlybovets, Andrii, Serhii Shcherbyna, and Oksana Kyriienko. "Security Vulnerabilities and Protection Solutions in Internet of Things Systems." NaUKMA Research Papers. Computer Science 7 (May 12, 2025): 89–97. https://doi.org/10.18523/2617-3808.2024.7.89-97.
Full textGopal, Khorwal, and Sharma Reena. "Security and Privacy in IoT Systems: Challenges, Solutions, and Emerging Trends." Recent Trends in Information Technology and its Application 8, no. 2 (2025): 37–40. https://doi.org/10.5281/zenodo.15074274.
Full textRahman, Md Aminur, and AKM Nuruzzaman Laskar. "Securing IoT Networks: Challenges and Solutions for Next-Generation Smart Devices." Journal of Information Technology and Sciences 10, no. 3 (2024): 15–20. http://dx.doi.org/10.46610/joits.2024.v10i03.002.
Full textRebecca Ling Ze Siew, Brendan Chan Kah Le, Lee Kai Yue, Nuri Nazirah Binti Ismail, Xavier Liong Zhi Hao, and Muhammad Faisal. "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology." International Journal of Computer Technology and Science 1, no. 3 (2024): 87–105. http://dx.doi.org/10.62951/ijcts.v1i3.29.
Full textDickson, Solomon Makasda, and Ijeoma Peace OKECHUKWU. "Cyber Security in the Age of the Internet of Things, Constraints, and Solutions." JOURNAL OF DIGITAL LEARNING AND DISTANCE EDUCATION 2, no. 11 (2023): 829–37. http://dx.doi.org/10.56778/jdlde.v2i11.233.
Full textOlieh, Ofuchi Ngozi Rich. "A Smart Contract-based Blockchain Solution in IoT Networks." European Journal of Computer Science and Information Technology 12, no. 2 (2024): 75–92. http://dx.doi.org/10.37745/ejcsit.2013/vol12n27592.
Full textMotwani, Dilip, Vidya Chitre, Varsha Bhosale, Mukesh Israni, Swapnil Sonawane, and Amit Nerurkar. "IoT security cryptographic solutions for trustworthy wireless sensor networks." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): 1283–94. http://dx.doi.org/10.47974/jdmsc-1982.
Full textUddin, Md Shihab. "Addressing IoT Security Challenges through AI Solutions." International Journal of Computer Applications 186, no. 45 (2024): 50–55. http://dx.doi.org/10.5120/ijca2024924107.
Full textVyshali Rao K P. "Analytical Study of Authentication and Lightweight Security Techniques in 5G-Enabled IoT Networks." Journal of Information Systems Engineering and Management 10, no. 15s (2025): 215–27. https://doi.org/10.52783/jisem.v10i15s.2445.
Full textLi, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.
Full textChmiel, Marta, Mateusz Korona, Fryderyk Kozioł, Krzysztof Szczypiorski, and Mariusz Rawski. "Discussion on IoT Security Recommendations against the State-of-the-Art Solutions." Electronics 10, no. 15 (2021): 1814. http://dx.doi.org/10.3390/electronics10151814.
Full textShankar S Miraji and Jyothikumari G. "Security protocols for industrial IoT: Lightweight cryptography and authentication methods." World Journal of Advanced Research and Reviews 6, no. 1 (2020): 297–306. https://doi.org/10.30574/wjarr.2020.6.1.0144.
Full textHwang, Song-Yi, and Jeong-Nyeo Kim. "A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools." Sensors 21, no. 21 (2021): 6983. http://dx.doi.org/10.3390/s21216983.
Full textMrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (2020): 3625. http://dx.doi.org/10.3390/s20133625.
Full textAbdullah, Ahmed Y., Ibrahim M. Elhenawy, and Ahmed Abdelmonem. "Security Challenges and Solutions in the Internet of Things." Journal of Intelligent Systems and Internet of Things 6, no. 2 (2022): 67–78. http://dx.doi.org/10.54216/jisiot.060206.
Full textBuddula, Dheeraj Varun Kumar Reddy, Hari Hara Sudheer Patchipulusu, Achuthananda Reddy Polu, Bhumeka Narra, Navya Vattikonda, and Anuj Kumar Gupta. "CYBERSECURITY CHALLENGES IN INTERNET OF THINGS ECOSYSTEMS: AN ANALYSIS OF THREATS, COUNTERMEASURES, AND FUTURE RESEARCH DIRECTIONS." ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING 07, no. 04 (2025): 89–100. https://doi.org/10.63665/ajeee.v07i04.01.
Full textDheeraj, Varun Kumar Reddy Buddula Hari Hara Sudheer Patchipulusu Achuthananda Reddy Polu Bhumeka Narra Navya Vattikonda and Anuj Kumar Gupta. "CYBERSECURITY CHALLENGES IN INTERNET OF THINGS ECOSYSTEMS: AN ANALYSIS OF THREATS, COUNTERMEASURES, AND FUTURE RESEARCH DIRECTIONS." ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING 07, no. 04 (2022): 89–100. https://doi.org/10.5281/zenodo.15335385.
Full textIkrissi, G., and T. Mazri. "IOT-BASED SMART ENVIRONMENTS: STATE OF THE ART, SECURITY THREATS AND SOLUTIONS." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 279–86. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-279-2021.
Full text