0% found this document useful (0 votes)
5 views

References

Uploaded by

Faisal Yazdanie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

References

Uploaded by

Faisal Yazdanie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

[1]

A. Gerodimos, L. Maglaras, M. A. Ferrag, N. Ayres, and I. Kantzavelou, “IoT:


Communication protocols and security threats,” Internet of Things and Cyber-
Physical Systems, vol. 3, Jan. 2023

Gerodimos, Apostolos, et al. “IoT: Communication Protocols and Security Threats.” Internet

of Things and Cyber-Physical Systems, vol. 3, Jan. 2023,

https://doi.org/10.1016/j.iotcps.2022.12.003.

[2]

Panchiwala, Shivani, and Manan Shah. “A Comprehensive Study on Critical Security Issues

and Challenges of the IoT World.” Journal of Data, Information and Management,

vol. 2, 6 May 2020, https://doi.org/10.1007/s42488-020-00030-2.

[3]

Naghib, Arezou, et al. “A Comprehensive and Systematic Literature Review on the Big Data

Management Techniques in the Internet of Things.” Wireless Networks, 15 Nov.

2022,

[4]

Ramson, S.R. Jino, et al. “Applications of Internet of Things (IoT) – an Overview.” IEEE

Xplore, 1 Mar. 2020, ieeexplore.ieee.org/abstract/document/9075807.

[5]

L. A. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT privacy and

Security: challenges and solutions,” Applied Sciences, vol. 10, no. 12, p.

4102, Jun. 2020


[6]

Sobin, C.C. A Survey on Architecture, Protocols and Challenges in IoT. Wireless Pers

Commun 112, 1383–1429 (2020).

[5]

Lombardi, Marco, et al. “Internet of Things: A General Overview between Architectures,

Protocols and Applications.” Information, vol. 12, no. 2, 19 Feb. 2021, p. 87,

https://doi.org/10.3390/info12020087.

[7]

A. Hameed and A. Alomary, "Security Issues in IoT: A Survey," 2019 International Conference on

Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), Sakhier,

Bahrain, 2019, pp. 1-5

[8]
R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of things (iot) security: Current status,
challenges and prospective measures,” in 2015 10th International Conference for Internet Technology and
Secured Transactions (ICITST). IEEE, 2015, pp. 336–341.

[9]

Sanislav, Teodora, et al. “Energy Harvesting Techniques for Internet of Things (IoT).” IEEE

Access, vol. 9, 2021, pp. 39530–39549, https://doi.org/10.1109/access.2021.3064066.

[10]

Chuang, Yo-Hsuan, et al. “A Lightweight Continuous Authentication Protocol for the

Internet of Things.” Sensors, vol. 18, no. 4, 5 Apr. 2018, p. 1104,

https://doi.org/10.3390/s18041104. Accessed 18 May 2022.

[11]

Velmurugan, P., et al. “An Advanced and Effective Encryption Methodology Used for

Modern IoT Security.” Materials Today: Proceedings, Apr. 2021,

https://doi.org/10.1016/j.matpr.2021.03.424. Accessed 9 Nov. 2021.


[12]

Ravidas, Sowmya, et al. “Access Control in Internet-of-Things: A Survey.” Journal of

Network and Computer Applications, vol. 144, Oct. 2019, pp. 79–101,

www.sciencedirect.com/science/article/pii/S108480451930222X,

https://doi.org/10.1016/j.jnca.2019.06.017.

[13]

Anand, Pooja, et al. “Internet of Things (IoT): Vulnerabilities and Remediation Strategies.”

Lecture Notes in Electrical Engineering, 1 Jan. 2021, pp. 265–273,

https://doi.org/10.1007/978-981-15-8297-4_22.

[14]

Yu, Dan, et al. “Large-Scale IoT Devices Firmware Identification Based on Weak Password.”

IEEE Access, vol. 8, 2020, pp. 7981–7992,

ieeexplore.ieee.org/abstract/document/8951016,

https://doi.org/10.1109/ACCESS.2020.2964646. Accessed 23 Mar. 2023.

[15]

Bakhshi, Taimur, et al. “A Review of IoT Firmware Vulnerabilities and Auditing

Techniques.” Sensors, vol. 24, no. 2, 1 Jan. 2024, p. 708, www.mdpi.com/1424-

8220/24/2/708, https://doi.org/10.3390/s24020708.

[16]

Karale, Ashwin. “The Challenges of IoT Addressing Security, Ethics, Privacy and Laws.”

Internet of Things, vol. 15, no. 1, June 2021, p. 100420,

https://doi.org/10.1016/j.iot.2021.100420.

[17]

Soumyalatha, Shruti G. Hegde. "Study of IoT: understanding IoT architecture, applications, issues

and challenges." 1st International Conference on Innovations in Computing & Net-working


(ICICN16), CSE, RRCE. International Journal of Advanced Networking & Applications. Vol.

478. 2016.

‌[18]

Zeadally, Sherali, et al. “Design Architectures for Energy Harvesting in the Internet of

Things.” Renewable and Sustainable Energy Reviews, vol. 128, Aug. 2020, p.

109901, https://doi.org/10.1016/j.rser.2020.109901. Accessed 27 Oct. 2020.

[19]

Wu, Chuan-Kun. “IoT Security Architecture.” Advances in Computer Science and

Technology, 1 Jan. 2021, pp. 27–44, https://doi.org/10.1007/978-981-16-1372-2_3.

Accessed 1 May 2024.

[20]

Oh, Se-Ra, and Young-Gab Kim. “Security Requirements Analysis for the IoT.” IEEE

Xplore, 1 Feb. 2017, ieeexplore.ieee.org/abstract/document/7883727.

[21]

D. De Cremer, B. Nguyen, and L. Simkin, “The Integrity Challenge of the Internet-of-things


(IOT): On understanding its Dark Side,” Journal of Marketing Management, vol. 33,
no. 1–2, pp. 145–158, Nov. 2016. doi:10.1080/0267257x.2016.1247517

[22]

ip_admin. “Unpacking IoT Architecture: Layers and Components Explained.” Device

Authority, 16 Sept. 2023, deviceauthority.com/unpacking-iot-architecture-layers-and-


components-explained/#:~:text=The%20architecture%20of%20IoT%20has. Accessed

11 May 2024.

[23]

Lan Li, "Study on security architecture in the Internet of Things," Proceedings of 2012 International

Conference on Measurement, Information and Control, Harbin, China, 2012, pp. 374-377,

[24]

N. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, and P. Faruki, “Network


Intrusion Detection for IoT Security Based on Learning Techniques,” IEEE
Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2671–2701, 2019, doi:
https://doi.org/10.1109/comst.2019.2896380.

[25]

S. Rudrakar and P. Rughani, “IoT based Agriculture (Ag-IoT): A detailed study on


Architecture, Security and Forensics,” Information Processing in Agriculture, Sep.
2023
[26]
A. Malkawi et al., “Design and applications of an IoT architecture for data-driven
smart building operations and experimentation,” Energy and Buildings, vol. 295, p.
113291, Sep. 2023

‌[27]

P. Pawar and A. Trivedi, “Device-to-Device Communication Based IoT System:


Benefits and Challenges,” IETE Technical Review, pp. 1–13, Jun. 2018, doi:
https://doi.org/10.1080/02564602.2018.1476191.

‌[28]

Vangala, A., Das, A.K., Chamola, V. et al. Security in IoT-enabled smart agriculture: architecture,
security solutions and challenges. Cluster Comput 26, 879–902 (2023)

[29]

S. Rekha, L. Thirupathi, S. Renikunta, and R. Gangula, “Study of security issues


and solutions in Internet of Things (IoT),” Materials Today: Proceedings, vol. 80,
pp. 3554–3559, Jan. 2023
[30]

A. Bicaku, M. Tauber, and J. Delsing, “Security standard compliance and


continuous verification for Industrial Internet of Things,” International Journal of
Distributed Sensor Networks, vol. 16, no. 6, p. 155014772092273, Jun. 2020.

[31]
E. Schiller, A. Aidoo, J. Fuhrer, J. Stahl, M. Ziörjen, and B. Stiller, “Landscape of
IoT security,” Computer Science Review, vol. 44, p. 100467, May 2022

[32]

H. Mrabet, S. Belguith, A. Alhomoud, and A. Jemai, “A survey of IoT security


based on a layered architecture of sensing and data analysis,” Sensors, vol. 20, no.
13, p. 3625, Jun. 2020

[33]

H. F. Atlam and G. B. Wills, “IoT Security, Privacy, Safety and Ethics,” in Internet
of things, 2019

[34]

L. Maglaras, N. Ayres, S. Moschoyiannis, and L. Tassiulas, “The end of


Eavesdropping Attacks through the Use of Advanced End to End Encryption
Mechanisms,” IEEE INFOCOM 2022 - IEEE Conference on Computer
Communications Workshops (INFOCOM WKSHPS), May 2022

[35]

A. Guezzaz, S. Benkirane, and M. Azrour, “A novel anomaly network intrusion


detection system for internet of things security,” in EAI/Springer Innovations in
Communication and Computing, 2022, pp. 129–138.
[36]

G. Rathee, C. A. Kerrache, and C. T. Calafate, “An Ambient Intelligence approach


to provide secure and trusted Pub/Sub messaging systems in IoT
environments,” Computer Networks, vol. 218, p. 109401, Dec. 2022
[37]
G. Rathee, C. A. Kerrache, and M. Lahby, “TrustBlkSyS: a trusted and
blockchained cybersecure system for IIoT,” IEEE Transactions on Industrial
Informatics, vol. 19, no. 2, pp. 1592–1599, Feb. 2023,
[38]

G. Rathee, C. A. Kerrache, and M. A. Ferrag, “A Blockchain-Based intrusion


detection system using Viterbi algorithm and indirect trust for IIoT
systems,” Journal of Sensor and Actuator Networks, vol. 11, no. 4, p. 71, Oct.
2022

[39]

S. Singh, S. Rathore, O. Alfarraj, A. Tolba, and B. Yoon, “A framework for


privacy-preservation of IoT healthcare data using Federated Learning and
blockchain technology,” Future Generation Computer Systems, vol. 129, pp. 380–
388, Apr. 2022,

[40]

O. Friha, M. A. Ferrag, L. Shu, L. Maglaras, K.-K. R. Choo, and M. Nafaa,


“FELIDS: Federated learning-based intrusion detection system for agricultural
Internet of Things,” Journal of Parallel and Distributed Computing, vol. 165, pp.
17–31, Jul. 2022
[41]

P. Illy, G. Kaddoum, K. Kaur, and S. Garg, “ML-Based IDPS enhancement with


complementary features for home IoT networks,” IEEE Transactions on Network
and Service Management/IEEE eTransactions on Network and Service
Management, vol. 19, no. 2, pp. 772–783, Jun. 2022
[42]

M. Abutaha, B. Atawneh, L. Hammouri, and G. Kaddoum, “Secure lightweight


cryptosystem for IoT and pervasive computing,” Scientific Reports, vol. 12, no. 1,
Nov. 2022
[43]
S. Hashemi, M. Zarei, Internet of things backdoors: resource management issues, security challenges,
and detection methods, Trans. Emerg. Telecommun. Technol. 32 (2021) e4142.

[44]
T. Rajmohan, P. H. Nguyen, and N. Ferry, “A decade of research on patterns and
architectures for IoT security,” Cybersecurity, vol. 5, no. 1, Jan. 2022
[45]

N. Rachit, S. Bhatt, and P. R. Ragiri, “Security trends in Internet of Things: a


survey,” SN Applied Sciences/SN Applied Sciences, vol. 3, no. 1, Jan. 2021
[46]

U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, “A Critical Cybersecurity


Analysis and Future Research Directions for the Internet of Things: A
Comprehensive review,” Sensors, vol. 23, no. 8, p. 4117, Apr. 2023

[47]

H. A. Noman and O. M. F. Abu-Sharkh, “Code Injection Attacks in Wireless-Based


Internet of Things (IoT): A Comprehensive review and practical
Implementations,” Sensors, vol. 23, no. 13, p. 6067, Jun. 2023
[48]

P. Chaudhary, “Stock price synchronicity and stock liquidity in an emerging


market,” Global Business & Economics Review, vol. 27, no. 1, p. 116, Jan. 2022
[49]

Z. Cui, Y. Zhao, Y. Cao, X. Cai, W. Zhang, and J. Chen, “Malicious Code


Detection under 5G HetNets Based on a Multi-Objective RBM Model,” IEEE
Network, vol. 35, no. 2, pp. 82–87, Mar. 2021

[50]

You might also like