Academic literature on the topic 'Security of IoT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security of IoT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security of IoT"
Jogdand, Gopal, Shubham Kadam, Kiran Patil, and Gaurav Mate. "Iot Transaction Security." Journal of Advances and Scholarly Researches in Allied Education 15, no. 2 (2018): 711–16. http://dx.doi.org/10.29070/15/57056.
Full textAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (2021): 3654. http://dx.doi.org/10.3390/s21113654.
Full textKotaiah, Dharavath, and Chitti Ravi Kiran. "Network Security Key Areas of IoT and IIOT- with Connected Devices Privacy and Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 2076–82. http://dx.doi.org/10.22214/ijraset.2023.49873.
Full textToka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Full textDorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.
Full textM. S. Minu. "Enhancing IoT Security with Lightweight Cryptographic Operations Using Temporal Spatial Hyperdimensional Computing." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 138–49. https://doi.org/10.52783/jisem.v10i13s.2013.
Full textRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.
Full textRajakumaran, Gayathri, and Shola Usharani. "RFID Security in IoT." International Journal of Science and Research (IJSR) 11, no. 7 (2022): 1420–24. http://dx.doi.org/10.21275/sr22713162252.
Full textAlkunidry, Dona, Shahad Alhuwaysi, and Rawan Alharbi. "Security Threads and IoT Security." Journal of Computer and Communications 11, no. 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.
Full textAlasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things." Mathematics 11, no. 12 (2023): 2710. http://dx.doi.org/10.3390/math11122710.
Full textDissertations / Theses on the topic "Security of IoT"
Laaboudi, Younes. "Reactive security of IoT communications." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249633.
Full textShakra, Mohamed, and Ahmad Jabali. "Evaluating Security For An IoT Device." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289631.
Full textMakkar, Ankush. "Enhancing IoT Security Using 5G Capabilities." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.
Full textHaenel, Arié. "Hybrid security solutions for IoT devices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS022.
Full textSöderquist, Mårten. "Tiny Security : Evaluating energy use for security in an IoT application." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36860.
Full textMansouri, Mohamad. "Performance and Verifiability of IoT Security Protocols." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS065.
Full textTjäder, Hampus. "End-to-end Security Enhancement of an IoT Platform Using Object Security." Thesis, Linköpings universitet, Informationskodning, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138838.
Full textShahidi, Hamed. "Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.
Full textBlázquez, Rodríguez Alberto. "Security and AAA Architectures in an IoT Marketplace." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-234660.
Full textBeaulaton, Delphine. "Security Analysis of IoT Systems using Attack Trees." Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS548.
Full textBooks on the topic "Security of IoT"
Chaki, Rituparna, and Debdutta Barman Roy. Security in IoT. CRC Press, 2022. http://dx.doi.org/10.1201/9781003149507.
Full textNayak, Padmalaya, Niranjan Ray, and P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. CRC Press, 2021. http://dx.doi.org/10.1201/9781003124252.
Full textHancke, Gerhard P., and Konstantinos Markantonakis, eds. Radio Frequency Identification and IoT Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62024-4.
Full textMitton, Nathalie, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, and Patrick Capolsini, eds. Interoperability, Safety and Security in IoT. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52727-7.
Full textFortino, Giancarlo, Carlos E. Palau, Antonio Guerrieri, et al., eds. Interoperability, Safety and Security in IoT. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93797-7.
Full textDehghantanha, Ali, and Kim-Kwang Raymond Choo, eds. Handbook of Big Data and IoT Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-10543-3.
Full textJeyanthi, N., Ajith Abraham, and Hamid Mcheick, eds. Ubiquitous Computing and Computing Security of IoT. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-01566-4.
Full textPrasad, Ajay, Thipendra P. Singh, and Samidha Dwivedi Sharma, eds. Communication Technologies and Security Challenges in IoT. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0052-3.
Full textAzrour, Mourade, Jamal Mabrouki, Azidine Guezzaz, and Said Benkirane. Blockchain and Machine Learning for IoT Security. Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003438779.
Full textJiang, Hongbo, Hongyi Wu, and Fanzi Zeng, eds. Edge Computing and IoT: Systems, Management and Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73429-9.
Full textBook chapters on the topic "Security of IoT"
Monshizadeh, Mehrnoosh, and Vikramajeet Khatri. "IoT Security." In A Comprehensive Guide to 5G Security. John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch11.
Full textJabraeil Jamali, Mohammad Ali, Bahareh Bahrami, Arash Heidari, Parisa Allahverdizadeh, and Farhad Norouzi. "IoT Security." In Towards the Internet of Things. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18468-1_3.
Full textLedwaba, Lehlogonolo P. I., and Gerhard P. Hancke. "IoT Security." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_291.
Full textLedwaba, Lehlogonolo P. I., and Gerhard P. Hancke. "IoT Security." In Encyclopedia of Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_291-1.
Full textKalaga, Gunneswara Rao VSSS. "IoT Security." In Design of Internet of Things. CRC Press, 2022. http://dx.doi.org/10.1201/9781003303206-15.
Full textUpadhyay, Nidhi. "IoT Security." In Internet of Things. Apple Academic Press, 2023. http://dx.doi.org/10.1201/9781003304609-6.
Full textChakravarthi, Veena S. "IoT Security." In Internet of Things and M2M Communication Technologies. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79272-5_8.
Full textSniatala, Pawel, S. S. Iyengar, and Sanjeev Kaushik Ramani. "IoT Security." In Evolution of Smart Sensing Ecosystems with Tamper Evident Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77764-7_3.
Full textRussell, Brian. "IoT Cyber Security." In Intelligent Internet of Things. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-30367-9_10.
Full textGolani, Neha, and Rajkumar Rajasekaran. "IoT Challenges: Security." In Internet of Things (IoT). CRC Press, 2017. http://dx.doi.org/10.1201/9781315269849-11.
Full textConference papers on the topic "Security of IoT"
Pradana, Aditya, Fahmi Candra Permana, Kusprasapta Mutijarsa, and Yoanes Bandung. "Enhancing IoT Security: A Comprehensive Review of Lightweight Security Mechanisms for IoT." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929437.
Full textTiwari, Rajni, Debasmita Mishra, Nidhi Sinha, and Biswaranjan Acharya. "Securing IoT: Emphasizing Requirements for Enhanced Device Security." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882398.
Full textKhan, Mansoor, Muhammad Ilyas, and Oguz Bayat. "Enhancing IoT Security Through Hardware Security Modules (HSMs)." In 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS). IEEE, 2024. https://doi.org/10.1109/iccns62192.2024.10776375.
Full textSavithri, C. N., S. Lakshman Arun, B. S. Pradyumna Bhat, N. Udhaya Kiran, and S. Sriharan. "CRYPTOGUARD – IoT Biometric Home Security." In 2024 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS). IEEE, 2024. https://doi.org/10.1109/icpects62210.2024.10780420.
Full textTatarka, Slavomír, Michal Janovec, and Jozef Papán. "IoT Security Threats and Solutions." In 2024 International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2024. https://doi.org/10.1109/iceta63795.2024.10850844.
Full textAbinaya, A. Backia, K. Preethi, S. Janani, and S. G. Hymlin Rose. "Secure IoT: Fortifying IoT Security with Support Vector Machines." In 2024 IEEE North Karnataka Subsection Flagship International Conference (NKCon). IEEE, 2024. https://doi.org/10.1109/nkcon62728.2024.10774774.
Full textAjaj, Mohamad, and Saeddin Kalash. "Securing the Future of IoT: Exploring the Role of Blockchain Technology in IoT Security." In 2025 5th IEEE Middle East and North Africa Communications Conference (MENACOMM). IEEE, 2025. https://doi.org/10.1109/menacomm62946.2025.10911025.
Full textSharma, Anshika, and Himanshi Babbar. "Understanding IoT-23 Dataset: A Benchmark for IoT Security Analysis." In 2024 4th International Conference on Intelligent Technologies (CONIT). IEEE, 2024. http://dx.doi.org/10.1109/conit61985.2024.10627334.
Full textAbuserrieh, Lobna, and Manar H. Alalfi. "IoT-SafeMod: Model-Driven Security and Safety for IoT Applications." In 2025 IEEE/ACM 7th International Workshop on Software Engineering Research & Practices for the IoT (SERP4IoT). IEEE, 2025. https://doi.org/10.1109/serp4iot66600.2025.00013.
Full textRawat, Daksh, Prashant Kumar Mavi, Anupam Kumar Saini, Deeksha Verma, Purushottam Das, and Manika Manwal. "Securing IoT Face Recognition: Using Steganography Integration for Enhanced Security." In 2024 International Conference on Communication, Computing and Energy Efficient Technologies (I3CEET). IEEE, 2024. https://doi.org/10.1109/i3ceet61722.2024.10994164.
Full textReports on the topic "Security of IoT"
Wendzel, Steffen, and Saffija Kasem-Madani. IoT Security: The Improvement-Decelerating 'Cycle of Blame'. River Publishers, 2016. http://dx.doi.org/10.13052/popcas010.
Full textHowell, Gema. Security Analysis of IoT Management Solutions for First Responders. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.
Full textMichael, Fagan. Towards Automating IoT Security: Implementing Trusted Network-Layer Onboarding. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.cswp.42.ipd.
Full textGunathilake, Nilupulee, Ahmed Al-Dubai, and William Buchanan. Recent advances and trends in lightweight cryptography for IoT security. Peeref, 2023. http://dx.doi.org/10.54985/peeref.2303p1883219.
Full textGarcia-Morchon, O., S. Kumar, and M. Sethi. Internet of Things (IoT) Security: State of the Art and Challenges. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8576.
Full textKhalafalla, Aya, Adam Summers, Ifeoma Onunkwo, and Adrian Chavez. Cyber and Physical Security Analysis of GSI and Noventum Application for IoT Communications. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/2004898.
Full textLatorre, Lucia, Eduardo Rego, and Lorenzo De Leo. Tech Report: Internet of Things. Inter-American Development Bank, 2025. https://doi.org/10.18235/0013422.
Full textPhillips, Paul. The Application of Satellite-based Internet of Things for New Mobility. SAE International, 2024. http://dx.doi.org/10.4271/epr2024001.
Full textSonmez Turan, Meltem. Ascon-Based Lightweight Cryptography Standards for Constrained Devices. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-232.
Full textLatorre, Lucia, Valeria Lovaisa, Lorenzo De Leo, Alexander Riobó, Eduardo Riego, and Mariana Gutierrez. Tech Report: Edge Computing. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013021.
Full text