References |
: |
[1]Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access. 2019; 7:82721-43.
|
[Google Scholar] |
[2]Altulaihan E, Almaiah MA, Aljughaiman A. Cybersecurity threats, countermeasures and mitigation techniques on the iot: future research directions. Electronics. 2022; 11(20):1-41.
|
[Crossref] |
[Google Scholar] |
[3]Tabaa M, Monteiro F, Bensag H, Dandache A. Green industrial internet of things from a smart industry perspectives. Energy Reports. 2020; 6:430-46.
|
[Crossref] |
[Google Scholar] |
[4]Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access. 2022; 10:40281-306.
|
[Crossref] |
[Google Scholar] |
[5]Reddy YH, Ali A, Kumar PV, Srinivas MH, Netra K, Achari VJ, et al. A comprehensive survey of internet of things applications, threats, and security issues. South Asian Research Journal of Engineering and Technology. 2022; 4(4):63-77.
|
[Google Scholar] |
[6]Tariq N, Asim M, Al-Obeidat F, Zubair Farooqi M, Baker T, Hammoudeh M, et al. The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors. 2019; 19(8):1-33.
|
[Crossref] |
[Google Scholar] |
[7]Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N. Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials. 2019; 21(3):2702-33.
|
[Crossref] |
[Google Scholar] |
[8]Tawalbeh LA, Muheidat F, Tawalbeh M, Quwaider M. IoT Privacy and security: challenges and solutions. Applied Sciences. 2020; 10(12):1-17.
|
[Crossref] |
[Google Scholar] |
[9]https://www.statista.com/statistics/1321250/worldwide-internet-of-things-attacks/. Accessed 12th March 2022.
|
[10]Sahu D, Pradhan B, Khasnobish A, Verma S, Kim D, Pal K. The internet of things in geriatric healthcare. Journal of Healthcare Engineering. 2021; 2021:1-16.
|
[Crossref] |
[Google Scholar] |
[11]Al-Khafajiy M, Baker T, Chalmers C, Asim M, Kolivand H, Fahim M, Waraich A. Remote health monitoring of elderly through wearable sensors. Multimedia Tools and Applications. 2019; 78(17):24681-706.
|
[Crossref] |
[Google Scholar] |
[12]Hamid UZ, Zamzuri H, Limbu DK. Internet of vehicle (IoV) applications in expediting the implementation of smart highway of autonomous vehicle: a survey. Performability in Internet of Things. 2019:137-57.
|
[Crossref] |
[Google Scholar] |
[13]Alkinani MH, Almazroi AA, Jhanjhi NZ, Khan NA. 5G and IoT based reporting and accident detection (RAD) system to deliver first aid box using unmanned aerial vehicle. Sensors. 2021; 21(20):1-16.
|
[Crossref] |
[Google Scholar] |
[14]Hussain F, Hussain R, Hassan SA, Hossain E. Machine learning in IoT security: current solutions and future challenges. IEEE Communications Surveys & Tutorials. 2020; 22(3):1686-721.
|
[Crossref] |
[Google Scholar] |
[15]Hughes-Lartey K, Li M, Botchey FE, Qin Z. Human factor, a critical weak point in the information security of an organizations Internet of things. Heliyon. 2021; 7(3):e06522.
|
[Crossref] |
[Google Scholar] |
[16]Li R, Song T, Mei B, Li H, Cheng X, Sun L. Blockchain for large-scale internet of things data storage and protection. IEEE Transactions on Services Computing. 2018; 12(5):762-71.
|
[Crossref] |
[Google Scholar] |
[17]Chowdhury MZ, Shahjalal M, Hasan MK, Jang YM. The role of optical wireless communication technologies in 5G/6G and IoT solutions: prospects, directions, and challenges. Applied Sciences. 2019; 9(20):1-20.
|
[Crossref] |
[Google Scholar] |
[18]Yazdinejad A, Kazemi M, Parizi RM, Dehghantanha A, Karimipour H. An ensemble deep learning model for cyber threat hunting in industrial internet of things. Digital Communications and Networks. 2023; 9(1):101-10.
|
[Crossref] |
[Google Scholar] |
[19]Chanal PM, Kakkasageri MS. Security and privacy in IOT: a survey. Wireless Personal Communications. 2020; 115:1667-93.
|
[Crossref] |
[Google Scholar] |
[20]Kotsiopoulos T, Sarigiannidis P, Ioannidis D, Tzovaras D. Machine learning and deep learning in smart manufacturing: the smart grid paradigm. Computer Science Review. 2021.
|
[Crossref] |
[Google Scholar] |
[21]Gunduz MZ, Das R. Cyber-security on smart grid: threats and potential solutions. Computer networks. 2020; 169:107094.
|
[Crossref] |
[Google Scholar] |
[22]Kumar R, Sharma R. Leveraging blockchain for ensuring trust in IoT: a survey. Journal of King Saud University-Computer and Information Sciences. 2022; 34(10):8599-622.
|
[Crossref] |
[Google Scholar] |
[23]Pop P, Zarrin B, Barzegaran M, Schulte S, Punnekkat S, Ruh J, Steiner W. The FORA fog computing platform for industrial IoT. Information Systems. 2021; 98:101727.
|
[Crossref] |
[Google Scholar] |
[24]Deep S, Zheng X, Jolfaei A, Yu D, Ostovari P, Kashif Bashir A. A survey of security and privacy issues in the Internet of Things from the layered context. Transactions on Emerging Telecommunications Technologies. 2022; 33(6).
|
[Crossref] |
[Google Scholar] |
[25]Arisdakessian S, Wahab OA, Mourad A, Otrok H, Guizani M. A survey on iot intrusion detection: Federated learning, game theory, social psychology and explainable ai as future directions. IEEE Internet of Things Journal. 2022.
|
[Crossref] |
[Google Scholar] |
[26]Aristidou C, Marcou E. Blockchain standards and government applications. Journal of ICT Standardization. 2019: 287-312.
|
[Crossref] |
[Google Scholar] |
[27]Rani S, Kataria A, Sharma V, Ghosh S, Karar V, Lee K, Choi C. Threats and corrective measures for IoT security with observance of cybercrime: a survey. Wireless Communications and Mobile Computing. 2021; 2021:1-30.
|
[Crossref] |
[Google Scholar] |
[28]Roy S, Ashaduzzaman M, Hassan M, Chowdhury AR. Blockchain for IoT security and management: Current prospects, challenges and future directions. In 5th international conference on networking, systems and security (NSysS) 2018 (pp. 1-9). IEEE.
|
[Crossref] |
[Google Scholar] |
[29]Mohanta BK, Jena D, Satapathy U, Patnaik S. Survey on IoT security: challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet of Things. 2020.
|
[Crossref] |
[Google Scholar] |
[30]Mohanta BK, Sahoo A, Patel S, Panda SS, Jena D, Gountia D. Decauth: decentralized authentication scheme for iot device using ethereum blockchain. In TENCON 2019-2019 IEEE region 10 conference (TENCON) 2019 (pp. 558-63). IEEE.
|
[Crossref] |
[Google Scholar] |
[31]Aman AH, Yadegaridehkordi E, Attarbashi ZS, Hassan R, Park YJ. A survey on trend and classification of internet of things reviews. IEEE Access. 2020; 8:111763-82.
|
[Crossref] |
[Google Scholar] |
[32]Khanam S, Ahmedy IB, Idris MY, Jaward MH, Sabri AQ. A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access. 2020; 8:219709-43.
|
[Crossref] |
[Google Scholar] |
[33]Fahim M, Sillitti A. Anomaly detection, analysis and prediction techniques in iot environment: a systematic literature review. IEEE Access. 2019; 7:81664-81.
|
[Crossref] |
[Google Scholar] |
[34]Mishra B, Kertesz A. The use of MQTT in M2M and IoT systems: a survey. IEEE Access. 2020; 8:201071-86.
|
[Crossref] |
[Google Scholar] |
|