Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

[1]

A. Gerodimos, L. Maglaras, M. A. Ferrag, N. Ayres, and I. Kantzavelou, “IoT:


Communication protocols and security threats,” Internet of Things and Cyber-
Physical Systems, vol. 3, Jan. 2023

Gerodimos, Apostolos, et al. “IoT: Communication Protocols and Security Threats.” Internet

of Things and Cyber-Physical Systems, vol. 3, Jan. 2023,

https://doi.org/10.1016/j.iotcps.2022.12.003.

[2]

Panchiwala, Shivani, and Manan Shah. “A Comprehensive Study on Critical Security Issues

and Challenges of the IoT World.” Journal of Data, Information and Management,

vol. 2, 6 May 2020, https://doi.org/10.1007/s42488-020-00030-2.

[3]

Naghib, Arezou, et al. “A Comprehensive and Systematic Literature Review on the Big Data

Management Techniques in the Internet of Things.” Wireless Networks, 15 Nov.

2022,

[4]

Ramson, S.R. Jino, et al. “Applications of Internet of Things (IoT) – an Overview.” IEEE

Xplore, 1 Mar. 2020, ieeexplore.ieee.org/abstract/document/9075807.

[5]

L. A. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT privacy and

Security: challenges and solutions,” Applied Sciences, vol. 10, no. 12, p.

4102, Jun. 2020


[6]

Sobin, C.C. A Survey on Architecture, Protocols and Challenges in IoT. Wireless Pers

Commun 112, 1383–1429 (2020).

[5]

Lombardi, Marco, et al. “Internet of Things: A General Overview between Architectures,

Protocols and Applications.” Information, vol. 12, no. 2, 19 Feb. 2021, p. 87,

https://doi.org/10.3390/info12020087.

[7]

A. Hameed and A. Alomary, "Security Issues in IoT: A Survey," 2019 International Conference on

Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), Sakhier,

Bahrain, 2019, pp. 1-5

[8]
R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of things (iot) security: Current status,
challenges and prospective measures,” in 2015 10th International Conference for Internet Technology and
Secured Transactions (ICITST). IEEE, 2015, pp. 336–341.

[9]

Sanislav, Teodora, et al. “Energy Harvesting Techniques for Internet of Things (IoT).” IEEE

Access, vol. 9, 2021, pp. 39530–39549, https://doi.org/10.1109/access.2021.3064066.

[10]

Chuang, Yo-Hsuan, et al. “A Lightweight Continuous Authentication Protocol for the

Internet of Things.” Sensors, vol. 18, no. 4, 5 Apr. 2018, p. 1104,

https://doi.org/10.3390/s18041104. Accessed 18 May 2022.

[11]

Velmurugan, P., et al. “An Advanced and Effective Encryption Methodology Used for

Modern IoT Security.” Materials Today: Proceedings, Apr. 2021,

https://doi.org/10.1016/j.matpr.2021.03.424. Accessed 9 Nov. 2021.


[12]

Ravidas, Sowmya, et al. “Access Control in Internet-of-Things: A Survey.” Journal of

Network and Computer Applications, vol. 144, Oct. 2019, pp. 79–101,

www.sciencedirect.com/science/article/pii/S108480451930222X,

https://doi.org/10.1016/j.jnca.2019.06.017.

[13]

Anand, Pooja, et al. “Internet of Things (IoT): Vulnerabilities and Remediation Strategies.”

Lecture Notes in Electrical Engineering, 1 Jan. 2021, pp. 265–273,

https://doi.org/10.1007/978-981-15-8297-4_22.

[14]

Yu, Dan, et al. “Large-Scale IoT Devices Firmware Identification Based on Weak Password.”

IEEE Access, vol. 8, 2020, pp. 7981–7992,

ieeexplore.ieee.org/abstract/document/8951016,

https://doi.org/10.1109/ACCESS.2020.2964646. Accessed 23 Mar. 2023.

[15]

Bakhshi, Taimur, et al. “A Review of IoT Firmware Vulnerabilities and Auditing

Techniques.” Sensors, vol. 24, no. 2, 1 Jan. 2024, p. 708, www.mdpi.com/1424-

8220/24/2/708, https://doi.org/10.3390/s24020708.

[16]

Karale, Ashwin. “The Challenges of IoT Addressing Security, Ethics, Privacy and Laws.”

Internet of Things, vol. 15, no. 1, June 2021, p. 100420,

https://doi.org/10.1016/j.iot.2021.100420.

[17]

Soumyalatha, Shruti G. Hegde. "Study of IoT: understanding IoT architecture, applications, issues

and challenges." 1st International Conference on Innovations in Computing & Net-working


(ICICN16), CSE, RRCE. International Journal of Advanced Networking & Applications. Vol.

478. 2016.

‌[18]

Zeadally, Sherali, et al. “Design Architectures for Energy Harvesting in the Internet of

Things.” Renewable and Sustainable Energy Reviews, vol. 128, Aug. 2020, p.

109901, https://doi.org/10.1016/j.rser.2020.109901. Accessed 27 Oct. 2020.

[19]

Wu, Chuan-Kun. “IoT Security Architecture.” Advances in Computer Science and

Technology, 1 Jan. 2021, pp. 27–44, https://doi.org/10.1007/978-981-16-1372-2_3.

Accessed 1 May 2024.

[20]

Oh, Se-Ra, and Young-Gab Kim. “Security Requirements Analysis for the IoT.” IEEE

Xplore, 1 Feb. 2017, ieeexplore.ieee.org/abstract/document/7883727.

[21]

D. De Cremer, B. Nguyen, and L. Simkin, “The Integrity Challenge of the Internet-of-things


(IOT): On understanding its Dark Side,” Journal of Marketing Management, vol. 33,
no. 1–2, pp. 145–158, Nov. 2016. doi:10.1080/0267257x.2016.1247517

[22]

ip_admin. “Unpacking IoT Architecture: Layers and Components Explained.” Device

Authority, 16 Sept. 2023, deviceauthority.com/unpacking-iot-architecture-layers-and-


components-explained/#:~:text=The%20architecture%20of%20IoT%20has. Accessed

11 May 2024.

[23]

Lan Li, "Study on security architecture in the Internet of Things," Proceedings of 2012 International

Conference on Measurement, Information and Control, Harbin, China, 2012, pp. 374-377,

[24]

N. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, and P. Faruki, “Network


Intrusion Detection for IoT Security Based on Learning Techniques,” IEEE
Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2671–2701, 2019, doi:
https://doi.org/10.1109/comst.2019.2896380.

[25]

S. Rudrakar and P. Rughani, “IoT based Agriculture (Ag-IoT): A detailed study on


Architecture, Security and Forensics,” Information Processing in Agriculture, Sep.
2023
[26]
A. Malkawi et al., “Design and applications of an IoT architecture for data-driven
smart building operations and experimentation,” Energy and Buildings, vol. 295, p.
113291, Sep. 2023

‌[27]

P. Pawar and A. Trivedi, “Device-to-Device Communication Based IoT System:


Benefits and Challenges,” IETE Technical Review, pp. 1–13, Jun. 2018, doi:
https://doi.org/10.1080/02564602.2018.1476191.

‌[28]

Vangala, A., Das, A.K., Chamola, V. et al. Security in IoT-enabled smart agriculture: architecture,
security solutions and challenges. Cluster Comput 26, 879–902 (2023)

[29]

S. Rekha, L. Thirupathi, S. Renikunta, and R. Gangula, “Study of security issues


and solutions in Internet of Things (IoT),” Materials Today: Proceedings, vol. 80,
pp. 3554–3559, Jan. 2023
[30]

A. Bicaku, M. Tauber, and J. Delsing, “Security standard compliance and


continuous verification for Industrial Internet of Things,” International Journal of
Distributed Sensor Networks, vol. 16, no. 6, p. 155014772092273, Jun. 2020.

[31]
E. Schiller, A. Aidoo, J. Fuhrer, J. Stahl, M. Ziörjen, and B. Stiller, “Landscape of
IoT security,” Computer Science Review, vol. 44, p. 100467, May 2022

[32]

H. Mrabet, S. Belguith, A. Alhomoud, and A. Jemai, “A survey of IoT security


based on a layered architecture of sensing and data analysis,” Sensors, vol. 20, no.
13, p. 3625, Jun. 2020

[33]

H. F. Atlam and G. B. Wills, “IoT Security, Privacy, Safety and Ethics,” in Internet
of things, 2019

[34]

L. Maglaras, N. Ayres, S. Moschoyiannis, and L. Tassiulas, “The end of


Eavesdropping Attacks through the Use of Advanced End to End Encryption
Mechanisms,” IEEE INFOCOM 2022 - IEEE Conference on Computer
Communications Workshops (INFOCOM WKSHPS), May 2022

[35]

A. Guezzaz, S. Benkirane, and M. Azrour, “A novel anomaly network intrusion


detection system for internet of things security,” in EAI/Springer Innovations in
Communication and Computing, 2022, pp. 129–138.
[36]

G. Rathee, C. A. Kerrache, and C. T. Calafate, “An Ambient Intelligence approach


to provide secure and trusted Pub/Sub messaging systems in IoT
environments,” Computer Networks, vol. 218, p. 109401, Dec. 2022
[37]
G. Rathee, C. A. Kerrache, and M. Lahby, “TrustBlkSyS: a trusted and
blockchained cybersecure system for IIoT,” IEEE Transactions on Industrial
Informatics, vol. 19, no. 2, pp. 1592–1599, Feb. 2023,
[38]

G. Rathee, C. A. Kerrache, and M. A. Ferrag, “A Blockchain-Based intrusion


detection system using Viterbi algorithm and indirect trust for IIoT
systems,” Journal of Sensor and Actuator Networks, vol. 11, no. 4, p. 71, Oct.
2022

[39]

S. Singh, S. Rathore, O. Alfarraj, A. Tolba, and B. Yoon, “A framework for


privacy-preservation of IoT healthcare data using Federated Learning and
blockchain technology,” Future Generation Computer Systems, vol. 129, pp. 380–
388, Apr. 2022,

[40]

O. Friha, M. A. Ferrag, L. Shu, L. Maglaras, K.-K. R. Choo, and M. Nafaa,


“FELIDS: Federated learning-based intrusion detection system for agricultural
Internet of Things,” Journal of Parallel and Distributed Computing, vol. 165, pp.
17–31, Jul. 2022
[41]

P. Illy, G. Kaddoum, K. Kaur, and S. Garg, “ML-Based IDPS enhancement with


complementary features for home IoT networks,” IEEE Transactions on Network
and Service Management/IEEE eTransactions on Network and Service
Management, vol. 19, no. 2, pp. 772–783, Jun. 2022
[42]

M. Abutaha, B. Atawneh, L. Hammouri, and G. Kaddoum, “Secure lightweight


cryptosystem for IoT and pervasive computing,” Scientific Reports, vol. 12, no. 1,
Nov. 2022
[43]
S. Hashemi, M. Zarei, Internet of things backdoors: resource management issues, security challenges,
and detection methods, Trans. Emerg. Telecommun. Technol. 32 (2021) e4142.

[44]
T. Rajmohan, P. H. Nguyen, and N. Ferry, “A decade of research on patterns and
architectures for IoT security,” Cybersecurity, vol. 5, no. 1, Jan. 2022
[45]

N. Rachit, S. Bhatt, and P. R. Ragiri, “Security trends in Internet of Things: a


survey,” SN Applied Sciences/SN Applied Sciences, vol. 3, no. 1, Jan. 2021
[46]

U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, “A Critical Cybersecurity


Analysis and Future Research Directions for the Internet of Things: A
Comprehensive review,” Sensors, vol. 23, no. 8, p. 4117, Apr. 2023

[47]

H. A. Noman and O. M. F. Abu-Sharkh, “Code Injection Attacks in Wireless-Based


Internet of Things (IoT): A Comprehensive review and practical
Implementations,” Sensors, vol. 23, no. 13, p. 6067, Jun. 2023
[48]

P. Chaudhary, “Stock price synchronicity and stock liquidity in an emerging


market,” Global Business & Economics Review, vol. 27, no. 1, p. 116, Jan. 2022
[49]

Z. Cui, Y. Zhao, Y. Cao, X. Cai, W. Zhang, and J. Chen, “Malicious Code


Detection under 5G HetNets Based on a Multi-Objective RBM Model,” IEEE
Network, vol. 35, no. 2, pp. 82–87, Mar. 2021

[50]

You might also like