Journal articles on the topic 'Security of IoT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security of IoT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jogdand, Gopal, Shubham Kadam, Kiran Patil, and Gaurav Mate. "Iot Transaction Security." Journal of Advances and Scholarly Researches in Allied Education 15, no. 2 (2018): 711–16. http://dx.doi.org/10.29070/15/57056.
Full textAbosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (2021): 3654. http://dx.doi.org/10.3390/s21113654.
Full textKotaiah, Dharavath, and Chitti Ravi Kiran. "Network Security Key Areas of IoT and IIOT- with Connected Devices Privacy and Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 2076–82. http://dx.doi.org/10.22214/ijraset.2023.49873.
Full textToka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Full textDorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.
Full textM. S. Minu. "Enhancing IoT Security with Lightweight Cryptographic Operations Using Temporal Spatial Hyperdimensional Computing." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 138–49. https://doi.org/10.52783/jisem.v10i13s.2013.
Full textRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.
Full textRajakumaran, Gayathri, and Shola Usharani. "RFID Security in IoT." International Journal of Science and Research (IJSR) 11, no. 7 (2022): 1420–24. http://dx.doi.org/10.21275/sr22713162252.
Full textAlkunidry, Dona, Shahad Alhuwaysi, and Rawan Alharbi. "Security Threads and IoT Security." Journal of Computer and Communications 11, no. 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.
Full textAlasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things." Mathematics 11, no. 12 (2023): 2710. http://dx.doi.org/10.3390/math11122710.
Full textMa, Jinnan, Xuekui Shangguan, and Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home." Wireless Communications and Mobile Computing 2022 (August 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.
Full textUsman, Sahnius, Shahnurin Khanam Sanchi, Muhammad Idris, and Sadiq Abubakar Zagga. "SECURING IOT HEALTHCARE APPLICATIONS AND BLOCKCHAIN: ADDRESSING SECURITY ATTACKS." International Journal of Software Engineering and Computer Systems 9, no. 2 (2023): 119–28. http://dx.doi.org/10.15282/ijsecs.9.2.2023.5.0116.
Full textSaidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich, and Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy." ACADEMICIA: An International Multidisciplinary Research Journal 11, no. 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.
Full textShivani, Ramesh Sharma. "Internet of Things IoT IoT in Healthcare." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 980–82. https://doi.org/10.31142/ijtsrd23971.
Full textNurrisma. "Information System Security Analysis in the Internet of Things (IoT) Era." Journal Informatic, Education and Management (JIEM) 5, no. 1 (2023): 16–20. http://dx.doi.org/10.61992/jiem.v5i1.71.
Full textAl Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.
Full textMashiya Afroze F and Dr. Jose Reena K. "A Survey Study on IoT Application and its Attacks." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 02 (2024): 80–86. http://dx.doi.org/10.47392/irjaeh.2024.0016.
Full textKrishna, Prasad K. "Securing the Internet of Things: A Comprehensive Analysis of Lightweight Cryptographic Approaches for Resource-Constrained Devices." International Journal of Information Technology Research Studies (IJITRS) 1, no. 1 (2025): 20–35. https://doi.org/10.5281/zenodo.15309858.
Full textLi, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.
Full textArat, Ferhat, and Sedat Akleylek. "Modified graph-based algorithm to analyze security threats in IoT." PeerJ Computer Science 9 (December 8, 2023): e1743. http://dx.doi.org/10.7717/peerj-cs.1743.
Full textMasyhur, Zulkarnaim, Firmansyah Ibrahim, and Didit Hermawan. "Internet of Things (IoT): Security, Threats and Countermeasures." Journal Software, Hardware and Information Technology 2, no. 2 (2022): 15–20. http://dx.doi.org/10.24252/shift.v2i2.31.
Full textJibrin, Abubakar, Ashraf Ishaq, Aliyu Ahmed, and Adamu Muhammad Gadafi. "The Role of Blockchain in Securing IoT Devices." Kwaghe International Journal of Engineering and Information Technology 2, no. 2 (2025): 78–95. https://doi.org/10.58578/kijeit.v2i2.5584.
Full textKant, Daniel, Andreas Johannsen, and Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol." Electronic Imaging 2021, no. 3 (2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.
Full textPapoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (2021): 1396. http://dx.doi.org/10.3390/app11041396.
Full textGiaretta, Alberto, Nicola Dragoni, and Fabio Massacci. "IoT Security Configurability with Security-by-Contract." Sensors 19, no. 19 (2019): 4121. http://dx.doi.org/10.3390/s19194121.
Full textGaurav Malik and Prashasti. "IoT Security: The vulnerabilities in internet of things devices and securing IoT ecosystem." International Journal of Science and Research Archive 8, no. 1 (2023): 1071–93. https://doi.org/10.30574/ijsra.2023.8.1.0093.
Full textHussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, et al. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment." Sensors 21, no. 9 (2021): 3025. http://dx.doi.org/10.3390/s21093025.
Full textP, Vivekanand, and Kamal Kumar Srivastava Dr. "Cyber security in the age of internet of things." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 836–41. https://doi.org/10.5281/zenodo.14246392.
Full textChen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 36–41. https://doi.org/10.5281/zenodo.12789562.
Full textSoofi, Aized Amin, Muhammad Tahir, and Naeem Raza. "Securing the Internet of Things: A Comprehensive Review of Security Challenges and Artificial Intelligence Solutions." Foundation University Journal of Engineering and Applied Sciences <br><i style="color:black;">(HEC Recognized Y Category , ISSN 2706-7351)</i> 4, no. 2 (2024): 1–20. http://dx.doi.org/10.33897/fujeas.v4i2.779.
Full textBalogh, Stefan, Ondrej Gallo, Roderik Ploszek, Peter Špaček, and Pavol Zajac. "IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques." Electronics 10, no. 21 (2021): 2647. http://dx.doi.org/10.3390/electronics10212647.
Full textChen, Fei, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan, and Hong-Linh Truong. "IoT Cloud Security Review." ACM Computing Surveys 54, no. 4 (2021): 1–36. http://dx.doi.org/10.1145/3447625.
Full textYang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (2021): 6163. http://dx.doi.org/10.3390/s21186163.
Full textPoonia, Ramesh Chandra. "Securing the Sustainable Future : Cryptography and Security in AI & IoT." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): i—vii. http://dx.doi.org/10.47974/jdmsc-27-4-foreword.
Full textChoi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (2019): 752. http://dx.doi.org/10.3390/electronics8070752.
Full textShankar S Miraji and Jyothikumari G. "Security protocols for industrial IoT: Lightweight cryptography and authentication methods." World Journal of Advanced Research and Reviews 6, no. 1 (2020): 297–306. https://doi.org/10.30574/wjarr.2020.6.1.0144.
Full textZaher, Mahmoud A., and Nabil M. Eldakhly. "Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis." Journal of Cybersecurity and Information Management 10, no. 2 (2022): 26–34. http://dx.doi.org/10.54216/jcim.100203.
Full textAbidullah, Adel, Khoshal Rahman Rahmani, Wali Muhammad Wadid, and Musawer Hakimi. "Data Transfer Security in IoT Communication Based on Attribute-Based Cryptography." International Journal Software Engineering and Computer Science (IJSECS) 4, no. 2 (2024): 553–65. http://dx.doi.org/10.35870/ijsecs.v4i2.2887.
Full textTaji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi, and Fadoua Ghanimi. "Securing Smart Agriculture: Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches." Data and Metadata 2 (December 30, 2023): 155. http://dx.doi.org/10.56294/dm2023155.
Full textSonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.
Full textAlotaibi, Bandar. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities." Sensors 23, no. 17 (2023): 7470. http://dx.doi.org/10.3390/s23177470.
Full textRajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, et al. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.
Full textBhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, et al. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices." Sustainability 14, no. 21 (2022): 14645. http://dx.doi.org/10.3390/su142114645.
Full textTiwari,, Arun. "Security and Privacy Analysis in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.
Full textMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Full text(Corresponding Author), Omer Fawzi Awad, Layth Rafea Hazim, Abdulrahman Ahmed Jasim, and Oguz Ata. "ENHANCING IIOT SECURITY WITH MACHINE LEARNING AND DEEP LEARNING FOR INTRUSION DETECTION." Malaysian Journal of Computer Science 37, no. 2 (2024): 139–53. http://dx.doi.org/10.22452/mjcs.vol37no2.1.
Full textB, Shreya. "Blockchain in IOT Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 1074–77. http://dx.doi.org/10.22214/ijraset.2024.59962.
Full textAbdulghani, Hezam Akram, Anastasija Collen, and Niels Alexander Nijdam. "Guidance Framework for Developing IoT-Enabled Systems’ Cybersecurity." Sensors 23, no. 8 (2023): 4174. http://dx.doi.org/10.3390/s23084174.
Full textMrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (2020): 3625. http://dx.doi.org/10.3390/s20133625.
Full textkumar, Abhinav. "IOT Security with Blockchain." YMER Digital 20, no. 11 (2021): 7–19. http://dx.doi.org/10.37896/ymer20.11/2.
Full text