To see the other types of publications on this topic, follow the link: Security of IoT.

Journal articles on the topic 'Security of IoT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security of IoT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jogdand, Gopal, Shubham Kadam, Kiran Patil, and Gaurav Mate. "Iot Transaction Security." Journal of Advances and Scholarly Researches in Allied Education 15, no. 2 (2018): 711–16. http://dx.doi.org/10.29070/15/57056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (2021): 3654. http://dx.doi.org/10.3390/s21113654.

Full text
Abstract:
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and h
APA, Harvard, Vancouver, ISO, and other styles
3

Kotaiah, Dharavath, and Chitti Ravi Kiran. "Network Security Key Areas of IoT and IIOT- with Connected Devices Privacy and Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 2076–82. http://dx.doi.org/10.22214/ijraset.2023.49873.

Full text
Abstract:
Abstract: With the accelerating pace of technological advancement, demand for IoT app development is at an all-time high. Statistic predicts that $1.1 trillion will be spent globally on IoT. (approx.).Modern IoT apps and solutions will unquestionably become more popular as a result of this. Who will get the newest item into consumers' hands first among manufacturers is still a point of contention. Companies can profit much from IoT app development, but one of the key considerations is security. This post focused on IoT security issues and solutions. IoT solutions can be implemented by business
APA, Harvard, Vancouver, ISO, and other styles
4

Toka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.

Full text
Abstract:
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most
APA, Harvard, Vancouver, ISO, and other styles
5

Dorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.

Full text
Abstract:
Recently, it has become important to integrate cybersecurity threat management policies in the management of any organization that uses information systems, whether large, medium or even small organizations. People live in the center of the field of smart homes, business opportunities of smart industrial cities and healthcare. Even as IoT security issues become increasingly ubiquitousin the industrial realm, they face the added challenge of evolving networks. Architecture towards the integration of information technology (IT) and operational technology (OT) networks. This article analyzes the
APA, Harvard, Vancouver, ISO, and other styles
6

M. S. Minu. "Enhancing IoT Security with Lightweight Cryptographic Operations Using Temporal Spatial Hyperdimensional Computing." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 138–49. https://doi.org/10.52783/jisem.v10i13s.2013.

Full text
Abstract:
Introduction: Network-based security challenges related to the Internet of Things (IoT) are rising, network-based security challenges have become more prominent, raising concerns about the vulnerability of systems to severe security threats. Cyberattacks such as command injection, denial of service, surveillance, and backdoors exploit abnormal patterns in network behavior. Traditional machine learning techniques, including logistic regression and feature-based support vector machines, have been integrated with end-to-end deep neural networks to enhance intrusion detection. However, these appro
APA, Harvard, Vancouver, ISO, and other styles
7

Raimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.

Full text
Abstract:
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limi
APA, Harvard, Vancouver, ISO, and other styles
8

Rajakumaran, Gayathri, and Shola Usharani. "RFID Security in IoT." International Journal of Science and Research (IJSR) 11, no. 7 (2022): 1420–24. http://dx.doi.org/10.21275/sr22713162252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alkunidry, Dona, Shahad Alhuwaysi, and Rawan Alharbi. "Security Threads and IoT Security." Journal of Computer and Communications 11, no. 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things." Mathematics 11, no. 12 (2023): 2710. http://dx.doi.org/10.3390/math11122710.

Full text
Abstract:
The Internet of Things (IoT) has experienced significant growth and is now a fundamental part of the next-generation Internet. Alongside improving daily life, IoT devices generate and collect vast amounts of data that can be leveraged by AI-enabled big data analytics for diverse applications. However, due to the machine-to-machine communication inherent in IoT, ensuring data security and privacy is crucial to mitigate various malicious cyber attacks, including man-in-the-middle, impersonation, and data poisoning attacks. Nevertheless, designing an efficient and adaptable IoT security framework
APA, Harvard, Vancouver, ISO, and other styles
11

Ma, Jinnan, Xuekui Shangguan, and Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home." Wireless Communications and Mobile Computing 2022 (August 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.

Full text
Abstract:
The Internet of Things (IoT) acts as a tremendous network that is constructed by fusing diverse sensors. IoT can achieve the interconnection of individuals, things, and machines at any place and time and improve the function performance of network applications. However, the security of IoT has always been a major problem that may limit the application perspective of IoT technologies. Nowadays, industrial IOT (IIoT), Internet of vehicles (IoV), and smart home have become the three primary emerging perspectives of the current IoT studies, and it is necessary to systematically highlight the secur
APA, Harvard, Vancouver, ISO, and other styles
12

Usman, Sahnius, Shahnurin Khanam Sanchi, Muhammad Idris, and Sadiq Abubakar Zagga. "SECURING IOT HEALTHCARE APPLICATIONS AND BLOCKCHAIN: ADDRESSING SECURITY ATTACKS." International Journal of Software Engineering and Computer Systems 9, no. 2 (2023): 119–28. http://dx.doi.org/10.15282/ijsecs.9.2.2023.5.0116.

Full text
Abstract:
The Internet of Things (IoT) describes the connection of bodily devices as "things" that can communicate with other systems and devices through the Internet and exchange statistics (data or information), facilitating the exchange of data with other systems and devices. These devices have sensors, software, and various components designed to exchange data seamlessly within the IoT network. Securing and protecting the data transmitted over the Internet from unauthorized access is imperative to ensuring the integrity and confidentiality of the information. IoT Smart health monitoring systems, int
APA, Harvard, Vancouver, ISO, and other styles
13

Saidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich, and Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy." ACADEMICIA: An International Multidisciplinary Research Journal 11, no. 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Shivani, Ramesh Sharma. "Internet of Things IoT IoT in Healthcare." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 980–82. https://doi.org/10.31142/ijtsrd23971.

Full text
Abstract:
IoT is a modest way to elevate our production and yield with the help of internet. We can supervise and control and communicate with the help of internet. Internet Of Things imagines a future physical and digital entities are to be linked by proper information and communication technologies which will sanction new class of applications and services. In this survey we will ensure a survey of applications and research difficulties for Internet Of Things in Healthcare. Shivani Ramesh Sharma "Internet of Things (IoT): IoT in Healthcare" Published in International Journal of Trend in Scie
APA, Harvard, Vancouver, ISO, and other styles
15

Nurrisma. "Information System Security Analysis in the Internet of Things (IoT) Era." Journal Informatic, Education and Management (JIEM) 5, no. 1 (2023): 16–20. http://dx.doi.org/10.61992/jiem.v5i1.71.

Full text
Abstract:
The presence of the Internet of Things (IoT) has provided a new foundation in the development of information systems, but has also raised new challenges related to information security. This research aims to analyze the level of information system security in the context of the IoT era. The research methods used include an in-depth literature survey and critical analysis of security frameworks relevant to IoT. The research results show that while IoT offers great potential to increase efficiency and convenience, it also opens up new avenues for complex and serious security attacks. Security th
APA, Harvard, Vancouver, ISO, and other styles
16

Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.

Full text
Abstract:
Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, an
APA, Harvard, Vancouver, ISO, and other styles
17

Mashiya Afroze F and Dr. Jose Reena K. "A Survey Study on IoT Application and its Attacks." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 02 (2024): 80–86. http://dx.doi.org/10.47392/irjaeh.2024.0016.

Full text
Abstract:
The Internet of Things (IoT) has witnessed exponential growth in recent years, with billions of interconnected devices seamlessly communicating and exchanging data. While IoT offers unprecedented opportunities for innovation and convenience, it also introduces a plethora of security challenges. This abstract provides an overview of the key security concerns in IoT and explores emerging solutions to address them. Security in IoT is paramount due to the potential consequences of breaches. IoT devices are often resource-constrained and lack robust security features. Malicious actors can exploit t
APA, Harvard, Vancouver, ISO, and other styles
18

Krishna, Prasad K. "Securing the Internet of Things: A Comprehensive Analysis of Lightweight Cryptographic Approaches for Resource-Constrained Devices." International Journal of Information Technology Research Studies (IJITRS) 1, no. 1 (2025): 20–35. https://doi.org/10.5281/zenodo.15309858.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) devices has introduced significant security challenges due to their resource constraints and widespread deployment in critical applications. This research examines lightweight cryptographic approaches that can provide robust security for IoT communication while operating within the severe computational, memory, and energy limitations of IoT devices. Through systematic analysis of existing lightweight cryptographic primitives, protocols, and frameworks, this paper identifies the most promising solutions for securing IoT ecosystems. Our finding
APA, Harvard, Vancouver, ISO, and other styles
19

Li, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.

Full text
Abstract:
With the rapid development of the Internet of Things (IoT), the number of IoT devices has increased exponentially. Therefore, we have put forward higher security requirements for the management, transmission, and storage of massive IoT data. However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. Once the server is maliciously attacked, the security of IoT data will be greatly threatened. In view of t
APA, Harvard, Vancouver, ISO, and other styles
20

Arat, Ferhat, and Sedat Akleylek. "Modified graph-based algorithm to analyze security threats in IoT." PeerJ Computer Science 9 (December 8, 2023): e1743. http://dx.doi.org/10.7717/peerj-cs.1743.

Full text
Abstract:
In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability probl
APA, Harvard, Vancouver, ISO, and other styles
21

Masyhur, Zulkarnaim, Firmansyah Ibrahim, and Didit Hermawan. "Internet of Things (IoT): Security, Threats and Countermeasures." Journal Software, Hardware and Information Technology 2, no. 2 (2022): 15–20. http://dx.doi.org/10.24252/shift.v2i2.31.

Full text
Abstract:
Internet of Things (IoT) is a technology that is very popular lately and is starting to get busy in Indonesia, marked by various cellphone manufacturers building an IoT ecosystem. IoT can help connect objects such as sensors, vehicles, hospital instruments, household appliances and others. However, connecting these smart devices to the internet network causes various data security problems because internet technology and communication protocols have not been specifically designed to support IoT devices. The leakage of data security through the commercialization of IoT devices, causes privacy p
APA, Harvard, Vancouver, ISO, and other styles
22

Jibrin, Abubakar, Ashraf Ishaq, Aliyu Ahmed, and Adamu Muhammad Gadafi. "The Role of Blockchain in Securing IoT Devices." Kwaghe International Journal of Engineering and Information Technology 2, no. 2 (2025): 78–95. https://doi.org/10.58578/kijeit.v2i2.5584.

Full text
Abstract:
The proliferation of Internet of Things (IoT) devices has introduced unprecedented security challenges, including data breaches, unauthorized access, and the exploitation of centralized network vulnerabilities. Traditional security architectures struggle to provide robust protection due to the distributed and resource-constrained nature of IoT environments. Blockchain technology, with its decentralized ledger, cryptographic security, and smart contract functionality, presents a promising approach to mitigating these risks. By ensuring data integrity, enabling secure authentication, and facilit
APA, Harvard, Vancouver, ISO, and other styles
23

Kant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Full text
Abstract:
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment su
APA, Harvard, Vancouver, ISO, and other styles
24

Papoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (2021): 1396. http://dx.doi.org/10.3390/app11041396.

Full text
Abstract:
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building blocks to architectures, can be an asset in alleviating said barrier. More specifically, patterns can be used to encode dependencies between SP properties of individual smart objects and corresponding properties of orchestrations (compositions) involving them, facilitating the des
APA, Harvard, Vancouver, ISO, and other styles
25

Giaretta, Alberto, Nicola Dragoni, and Fabio Massacci. "IoT Security Configurability with Security-by-Contract." Sensors 19, no. 19 (2019): 4121. http://dx.doi.org/10.3390/s19194121.

Full text
Abstract:
Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove.
APA, Harvard, Vancouver, ISO, and other styles
26

Gaurav Malik and Prashasti. "IoT Security: The vulnerabilities in internet of things devices and securing IoT ecosystem." International Journal of Science and Research Archive 8, no. 1 (2023): 1071–93. https://doi.org/10.30574/ijsra.2023.8.1.0093.

Full text
Abstract:
The Internet of Things (IoT) has reached the top of most people's minds in modern society, with countless advantages widespread in healthcare, manufacturing, and smart cities. This increased number of connected devices is an extremely serious security problem. They examine aspects vulnerable to security breaches in IoT devices, especially the sources of security breaches, such as weak authentication mechanisms, insecure communication protocols, and lack of device updates. The paper also analyzes how these vulnerabilities affect privacy, safety, and business operations. The study, by pointing o
APA, Harvard, Vancouver, ISO, and other styles
27

Hussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, et al. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment." Sensors 21, no. 9 (2021): 3025. http://dx.doi.org/10.3390/s21093025.

Full text
Abstract:
The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices’ security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established. However, due to the r
APA, Harvard, Vancouver, ISO, and other styles
28

P, Vivekanand, and Kamal Kumar Srivastava Dr. "Cyber security in the age of internet of things." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 836–41. https://doi.org/10.5281/zenodo.14246392.

Full text
Abstract:
Intelligent objects in the IoT are made up of a wide variety of sensors, networks, electrical devices, and process technologies that all work together to offer consumers with efficient and insightful services. The concept of a "smart city," in which residents enjoy improved quality of life thanks to cutting-edge infrastructure, has been presented as a means of addressing urban issues. The goal of this article is to present a comprehensive evaluation of IoT technology, with special attention paid to its potential for harm in the areas of privacy and security. Researchers are studying the servic
APA, Harvard, Vancouver, ISO, and other styles
29

Chen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 36–41. https://doi.org/10.5281/zenodo.12789562.

Full text
Abstract:
The Internet of Things (IoT) represents a significant transformation in how devices communicate and interact, offering unprecedented convenience and efficiency. However, this interconnected environment also introduces substantial security challenges. Traditional network security measures are often inadequate for IoT environments due to their unique characteristics, such as resource constraints and diverse device types. This paper explores the current state of network security in the IoT era, examines the specific challenges posed by IoT environments, and presents innovative solutions and best
APA, Harvard, Vancouver, ISO, and other styles
30

Soofi, Aized Amin, Muhammad Tahir, and Naeem Raza. "Securing the Internet of Things: A Comprehensive Review of Security Challenges and Artificial Intelligence Solutions." Foundation University Journal of Engineering and Applied Sciences <br><i style="color:black;">(HEC Recognized Y Category , ISSN 2706-7351)</i> 4, no. 2 (2024): 1–20. http://dx.doi.org/10.33897/fujeas.v4i2.779.

Full text
Abstract:
One of the major needs and challenges of this century is the use of cutting-edge technology considering the industry 4.0 revolution. The Internet of Things (IoT) falls in the category of a cutting-edge example of such innovation in the computing and information industry. In IoT compared to classical networking methods practically; every device we employ is accessible at any time from any location. Nevertheless, IoT continues to encounter several security challenges, and the magnitude of cyber-physical security risks is escalating alongside the widespread use of IoT technologies considering Moo
APA, Harvard, Vancouver, ISO, and other styles
31

Balogh, Stefan, Ondrej Gallo, Roderik Ploszek, Peter Špaček, and Pavol Zajac. "IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques." Electronics 10, no. 21 (2021): 2647. http://dx.doi.org/10.3390/electronics10212647.

Full text
Abstract:
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threa
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Fei, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan, and Hong-Linh Truong. "IoT Cloud Security Review." ACM Computing Surveys 54, no. 4 (2021): 1–36. http://dx.doi.org/10.1145/3447625.

Full text
Abstract:
Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research eff
APA, Harvard, Vancouver, ISO, and other styles
33

Yang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (2021): 6163. http://dx.doi.org/10.3390/s21186163.

Full text
Abstract:
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contempora
APA, Harvard, Vancouver, ISO, and other styles
34

Poonia, Ramesh Chandra. "Securing the Sustainable Future : Cryptography and Security in AI & IoT." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): i—vii. http://dx.doi.org/10.47974/jdmsc-27-4-foreword.

Full text
Abstract:
The objective of this special issue titled “Securing the Sustainable Future: Cryptography and Security in AI &amp; IoT” is to discuss recent advancements of cryptography and security in AI &amp; IoT for a secure, sustainable future. The issue focuses on the social and economic impact of sustainable computing, with sub-topics covering the applications of AI &amp; IoT. Additionally, the conference has explored security mechanisms in the context of sustainability.
APA, Harvard, Vancouver, ISO, and other styles
35

Choi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (2019): 752. http://dx.doi.org/10.3390/electronics8070752.

Full text
Abstract:
The Internet of things (IoT) technology, which is currently considered the new growth engine of the fourth industrial revolution, affects our daily life and has been applied to various industrial fields. Studies on overcoming the limitations of scalability and stability in a centralized IoT operating environment by employing distributed blockchain technology have been actively conducted. However, the nature of IoT that ensures connectivity with multiple objects at any time and any place increases security threats. Further, it extends the influence of the cyber world into the physical domain, r
APA, Harvard, Vancouver, ISO, and other styles
36

Shankar S Miraji and Jyothikumari G. "Security protocols for industrial IoT: Lightweight cryptography and authentication methods." World Journal of Advanced Research and Reviews 6, no. 1 (2020): 297–306. https://doi.org/10.30574/wjarr.2020.6.1.0144.

Full text
Abstract:
The Industrial Internet of Things (IIoT) represents a paradigm shift in manufacturing and industrial automation, connecting billions of devices to create smart factories and efficient production systems. However, the integration of IoT devices in industrial environments introduces significant security challenges due to resource constraints, heterogeneous networks, and critical operational requirements. This paper presents a comprehensive analysis of security protocols specifically designed for industrial IoT environments, with particular emphasis on lightweight cryptography and authentication
APA, Harvard, Vancouver, ISO, and other styles
37

Zaher, Mahmoud A., and Nabil M. Eldakhly. "Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis." Journal of Cybersecurity and Information Management 10, no. 2 (2022): 26–34. http://dx.doi.org/10.54216/jcim.100203.

Full text
Abstract:
The Internet of Things (IoT) has revolutionized the way we interact with everyday objects, enabling devices to collect and share data seamlessly. However, this increased connectivity has also increased the security risks associated with these devices, as they often lack the necessary security mechanisms to prevent malicious attacks. To address this issue, we propose using blockchain technology to secure IoT devices. In this paper, we present a proof-of-concept implementation of a blockchain-based IoT security system and analyze its effectiveness. Our system leverages blockchain's distributed l
APA, Harvard, Vancouver, ISO, and other styles
38

Abidullah, Adel, Khoshal Rahman Rahmani, Wali Muhammad Wadid, and Musawer Hakimi. "Data Transfer Security in IoT Communication Based on Attribute-Based Cryptography." International Journal Software Engineering and Computer Science (IJSECS) 4, no. 2 (2024): 553–65. http://dx.doi.org/10.35870/ijsecs.v4i2.2887.

Full text
Abstract:
Due to the drastic growth, the Internet of Things (IoT) has become an inevitable form of human life. However, IoT communication is subjected to a vast range of security breaches in the vulnerable environment, which leads to the demand for appropriate technology security issues in IoT communication. The cryptography technique exhibits effective security characteristics that promise promising results for identifying security breaches in IoT. This paper proposes attribute-based elliptical curve cryptography (ATB_ECC) to improve security in IoT communication. IoT devices perform communication to o
APA, Harvard, Vancouver, ISO, and other styles
39

Taji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi, and Fadoua Ghanimi. "Securing Smart Agriculture: Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches." Data and Metadata 2 (December 30, 2023): 155. http://dx.doi.org/10.56294/dm2023155.

Full text
Abstract:
The Internet of Things (IoT) is a decentralized network of physically connected devices that communicate with other systems and devices over the internet. As the number of IoT-based devices continues to grow at an exponential rate, this technology has the potential to improve nearly every aspect of daily life, from smart networks and transportation to home automation and agriculture. However, the absence of adequate security measures on all levels of the IoT poses a significant security risk, with the potential for cyber-attacks and data theft. While scholars have suggested various security me
APA, Harvard, Vancouver, ISO, and other styles
40

Sonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.

Full text
Abstract:
The IOT is changing the way we communicate and interact across businesses, enabling unprecedented productivity, efficiency, and data storage simulation. Development of IOT has brought many benefits but also significant challenges to network security. This article explores the key challenges in securing IoT environments, including device diversity, limited budgets, lack of security protocols, and vulnerability of transmitted information. Evaluate solutions such as the use of lightweight encryption algorithms, zerotrust architectures, and AI driven security systems to assess their potential effe
APA, Harvard, Vancouver, ISO, and other styles
41

Alotaibi, Bandar. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities." Sensors 23, no. 17 (2023): 7470. http://dx.doi.org/10.3390/s23177470.

Full text
Abstract:
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. One of the unrivaled characteristics of IIoT is the inter-connectivity provided to industries; however, this characteristic might open the door for cyber-criminals to launch various attacks. In fact, one o
APA, Harvard, Vancouver, ISO, and other styles
42

Rajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, et al. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.

Full text
Abstract:
In terms of growth, effect, and capability, the 5G-enabled Internet of Things (IoT) is incredible. The volume of data distributed and processed by IoT (Internet of Things) systems that trust connectivity and coverage raises some security problems. As IoT technology is directly used in our daily lives, the threats of present cyberspace may grow more prominent globally. Extended network life, coverage, and connectivity are all required for securing IoT-based 5G network devices. As a result of these failures, there are flaws that lead to security breaches. Because purposeful faults can quickly re
APA, Harvard, Vancouver, ISO, and other styles
43

Bhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, et al. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices." Sustainability 14, no. 21 (2022): 14645. http://dx.doi.org/10.3390/su142114645.

Full text
Abstract:
The Internet of Things (IoT) has redefined several aspects of our daily lives, including automation and control of the living environment, innovative healthcare services, and much more. Digital IoT devices and sensors, when integrated with home appliances, industrial systems, and online services in the physical world, have brought intense, disruptive changes in our lives. The industry and home users have widely embraced these ‘things’ on the Internet or IoT. However, the innate, intrinsic repercussions regarding security and data privacy are not evaluated. Security applies to Industrial IoT (I
APA, Harvard, Vancouver, ISO, and other styles
44

Tiwari,, Arun. "Security and Privacy Analysis in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.

Full text
Abstract:
The concept of the Internet of Things (IoT) promises to make all electronic devices smart, connected and capable of functioning together seamlessly courtesy of a worldwide network that links virtual elements with physical ones. Every IoT item in this network has a unique identification number to indicate its position in this system. In addition, connectivity is important for effective coordination with some low-tech gadgets. In this chapter, we shall be discussing the relevant IoT systems and security issues related to them including privacy, security attacks, means of securing IoT environment
APA, Harvard, Vancouver, ISO, and other styles
45

Mohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.

Full text
Abstract:
The Internet of Things (IoT) has expanded access to information technology by combining both digital and physical fields as an emerging technology. IoT will increasingly overshadow human life as it becomes more pervasive. IoT will be applied to important areas of the national economy, such as health care and medical care, and smart transportation. Hence, data security in IoT must be met with highlights such as distinguishing proof, unwavering quality, integration, and verifiable, and so on. Security within the field of IoT is more vital in terms of openness and reliance. Security is an critica
APA, Harvard, Vancouver, ISO, and other styles
46

(Corresponding Author), Omer Fawzi Awad, Layth Rafea Hazim, Abdulrahman Ahmed Jasim, and Oguz Ata. "ENHANCING IIOT SECURITY WITH MACHINE LEARNING AND DEEP LEARNING FOR INTRUSION DETECTION." Malaysian Journal of Computer Science 37, no. 2 (2024): 139–53. http://dx.doi.org/10.22452/mjcs.vol37no2.1.

Full text
Abstract:
The rapid growth of the Internet of Things (IoT) and digital industrial devices has significantly impacted various aspects of life, underscoring the importance of the Industrial Internet of Things (IIoT). Given its importance in industrial contexts that affect human life, the IIoT represents a key subset of the broader IoT landscape. Due to the proliferation of sensors in smart devices, which are viewed as points of contact, as the gathering of data and information regarding the IIoT systems and devices operating on the IoT, there is an urgent requirement for developing effective security meth
APA, Harvard, Vancouver, ISO, and other styles
47

B, Shreya. "Blockchain in IOT Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 1074–77. http://dx.doi.org/10.22214/ijraset.2024.59962.

Full text
Abstract:
Abstract: The Internet of Things (IoT) paradigm is rapidly transforming various industries by enabling the interconnection of billions of devices. However, the pervasive deployment of IoT devices also introduces significant security challenges, including data integrity, confidentiality, and device authentication. Blockchain technology, initially popularized by cryptocurrencies, has emerged as a promising solution to enhance the security of IoT ecosystems. This paper provides a comprehensive review of the integration of blockchain technology into IoT security frameworks. We explore various bloc
APA, Harvard, Vancouver, ISO, and other styles
48

Abdulghani, Hezam Akram, Anastasija Collen, and Niels Alexander Nijdam. "Guidance Framework for Developing IoT-Enabled Systems’ Cybersecurity." Sensors 23, no. 8 (2023): 4174. http://dx.doi.org/10.3390/s23084174.

Full text
Abstract:
Internet of Things (IoT) faces security concerns different from existing challenges in conventional information systems connected through the Internet because of their limited resources and heterogeneous network setups. This work proposes a novel framework for securing IoT objects, the key objective of which is to assign different Security Level Certificates (SLC) for IoT objects according to their hardware capabilities and protection measures implemented. Objects with SLCs, therefore, will be able to communicate with each other or with the Internet in a secure manner. The proposed framework i
APA, Harvard, Vancouver, ISO, and other styles
49

Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (2020): 3625. http://dx.doi.org/10.3390/s20133625.

Full text
Abstract:
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimi
APA, Harvard, Vancouver, ISO, and other styles
50

kumar, Abhinav. "IOT Security with Blockchain." YMER Digital 20, no. 11 (2021): 7–19. http://dx.doi.org/10.37896/ymer20.11/2.

Full text
Abstract:
Internet of Things (IoT) plays a very vital role in almost every field of technology. Its key elements of security are very much crucial elements which are to be maintained as it is used universally. Traditional security and privacy methods be likely to be inapplicable for IoT, mainly due to its distributed network topology and the supply-constraints of most of its devices. For creating these concepts, a new technology called blockchain can be used. Blockchain that reinforce the crypto- currency Bitcoin have been just now used to provide security and privacy in peer-to-peer networks with simil
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!