RESEARCH REGARDING THE SAFE USE OF INTERCONNECTED SMART DEVICES ON THE INTERNET OF THINGS
Abstract
Full Text:
PDFReferences
Maglaras, L.A., Ferrag, M. A., Janicke, H., Ayres, N., Tassiulas, L., Reliability, security, and privacy in power grids, Computer, 55 (2022b), 85–88.
Reed D., Applying the OSI seven-layer network model to information security, SANS GIAC GSEC Practical Assignment Version 1.4 b Option One, 2003.
Kaur D., Singh, P., Various OSI layer attacks and countermeasure to enhance the performance of WSNs during wormhole attack, International Journal on Network Security, vol. 5(1), 2014, pp. 62.
Mitrokotsa, A., Rieback, M. R., Tanenbaum, A. S., Classification of RFID attacks, Gen,15693, Volume 12, Issue 5, pp. 491–505, 2010.
Li, H., Chen, Y., He, Z., The survey of RFID attacks and defenses, 8th International Conference on Wireless Communications, Shanghai: Networking and Mobile Computing (WiCOM), 2012.
Deogirikar, J., Vidhate, A., Security attacks in IoT: A survey, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 32–37, doi: 10.1109/I-SMAC.2017.8058363, 2017.
Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A., Security, privacy and trust in Internet of Things: The road ahead, Computer Network, vol. 76, pp. 146–164, Jan. 2015.
Arabo, A., Brown, I., El-Moussa, F., Privacy in the age of mobility and smart devices in smart homes, In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on Social Computing (Social Com). IEEE, 2012, pp. 819–826.
Sarowar, M. G., Kamal, M. S., Dey, N. 2019, Internet of Things and Its Impacts in Computing Intelligence: A Comprehensive Review – IoT Application for Big Data, N. Dey and S. Tamane (Eds.), Big Data Analytics for Smart and Connected Cities (pp. 103–136). Hershey, PA: IGI Global. doi: 10.4018/978-1-5225-6207-8.ch005.
Hassanien, A. E., Dey, N., Borra, S. (Eds.), 2018, Medical Big Data and Internet of Medical Things: Advances, Challenges and Applications, CRC Press, Boca Raton. eBook ISBN 9781351030380, 2018.
Jelić, A., What is architecture for? Designing as enriching the landscape of affordances, Adapt. Behav., vol. 30, no. 6, pp. 585–587, 2022. doi: 10.1177/1059712321994686.
Lu, Y., Cecil, J., An Internet of Things (IoT)-based collaborative framework for advanced manufacturing, Int. J. Adv. Manuf. Technol., vol. 84, no. 2, pp. 1141–1152, 2016. doi: 10.1007/s00170-015-7772-0.
Jabraeil, J. M. A., et al., IoT architecture, in Towards the Internet of Things, 1st ed. Cham, Switzerland: Springer, 2020, pp. 9–31.
Ahmid M., Kazar, O., A comprehensive review of the internet of things security, J. Appl. Secur. Res., vol. 18, no. 3, pp. 289–305, 2023. doi: 10.1080/19361610.2021.1962677.
Alqarawi, G., Alkhalifah, B., Alharbi, N., El Khediri, S., Internet-of-Things security and vulnerabilities: Case study, J. Appl. Secur. Res., vol. 18, no. 3, pp. 559–575, 2023. doi: 10.1080/19361610.2022.2031841.
Hassan, A., et al., Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity, Computers, Materials & Continua, 2024, 81(3), 3499–3559.
Alam, T., Design a blockchain-based middleware layer in the Internet of Things architecture, Int. J. Informat. Vis., vol. 4, no. 1, pp. 28–31, 2020. doi: 10.30630/joiv.4.1.334.
Gerodimos, A., et al, IoT: Communication protocols and security threats, Internet of Things and Cyber-Physical Systems Volume 3, 2023, Pages 1–13.
Fan, Y., et al., SNPL: One scheme of securing nodes in IoT perception layer, Sensors, vol. 20, no. 4, 2020, Art. no. 1090. doi: 10.3390/s20041090.
Rodrigues C. K. D. S., Rocha, V., Towards blockchain for suitable efficiency and data integrity of IoT ecosystem transactions, IEEE Lat. Am. Trans., vol. 19, no. 7, pp. 1199–1206, 2021. doi: 10.1109/TLA.2021.9461849.
Devi M., Majumder, A., Side-channel attack in Internet of Things: A survey, Appl. Internet Things: Proc. ICCCIOT 2020, Singapore, Springer, 2021, pp. 213–222. doi: 10.1007/978-981-15-6198-6_20.
Nasralla, M. M., García-Magariño, I., Lloret, J., Defenses against perception-layer attacks on IoT smart furniture for impaired people, IEEE Access, vol. 8, pp. 119795119805, 2020. doi: 10.1109/ACCESS.2020.3004814.
Nebbione, G., Calzarossa, M. C., Security of IoT application layer protocols: Challenges and findings, Futur Internet, vol. 12, no. 3, 2020, Art. no. 55. doi: 10.3390/fi12030055.
Refbacks
- There are currently no refbacks.

