1,192 Hits in 4.3 sec

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis

Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, Lei Shu
2021 IEEE Access  
To provide the tensor based data mining while guaranteeing the data security in industrial internet of things, Kong et al.  ...  To construct a generalized model for anomaly detection in the industrial internet of things, Wang et al.  ...  ., and Habilitation degrees in computer science from Badji Mokhtar-Annaba University, Annaba, Algeria, in June, 2008, June, 2010, June, 2014, and April, 2019, respectively.  ... 
doi:10.1109/access.2021.3118642 fatcat:222fgsvt3nh6zcgm5qt4kxe7c4

Special Issue on Robustness and Efficiency in the Convergence of Artificial Intelligence and IoT

Meikang Qiu, Bhavani Thuraisingham, Mahmoud Daneshmand, Huansheng Ning, Payam Barnaghi
2021 IEEE Internet of Things Journal  
The article "An adversarial examples identification method for time series in the Internet-of-Things system" exploits the problem of AEs that lies in time-series data in IoT systems.  ...  The article "A 3-D topology evolution scheme with selfadaption for Industrial Internet of Things" exploits the problem of building an energy-efficient topology based on the unique mine terrain characteristics  ... 
doi:10.1109/jiot.2021.3073800 fatcat:yyhchydxabfsxjnvvfi7hsoexq

Cyber Physical Security for Industrial Control Systems and IoT

Kazukuni KOBARA
2016 IEICE transactions on information and systems  
Such systems are known as CPS (Cyber Physical Systems), IoT/E (Internet of Things/Everything), Industry 4.0, Industrial Internet, M2M, etc.  ...  In this paper, cybersecurity in ICS (Industrial Control Systems) is reviewed as a leading example of cyber physical security for critical infrastructures.  ...  This threat is not only specific to ICS or more widely Industry 4.0 and Industrial Internet, but also becoming common even in consumer areas with IoT (Internet of Things).  ... 
doi:10.1587/transinf.2015ici0001 fatcat:eyzooohacngtfd4neznvpwyf44

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things

Xuyun Zhang, Yuan Yuan, Zhili Zhou, Shancang Li, Lianyong Qi, Deepak Puthal
2019 Security and Communication Networks  
We are pleased to announce the publication of the special issue focusing on intrusion detection and prevention in cloud, fog, and Internet of Things (IoT).  ...  Internet of Things (IoT), cloud, and fog computing paradigms are as a whole provision a powerful large-scale computing infrastructure for many data and computation intensive applications.  ...  Acknowledgments We would also like to cordially thank all the reviewers who have participated in the review process of the articles submitted to this special issue and the special issue coordinators and  ... 
doi:10.1155/2019/4529757 fatcat:ehi3or2qtbdtzluyvgr5libxpe

Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things

Shi-Cho Cha, Kuo-Hui Yeh, Jyun-Fu Chen
2017 Sensors  
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm.  ...  In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings.  ...  The proposed ECC-based scheme is existentially secure against malicious adversary in the random oracle model, assuming the hardness of solving ECDLP.  ... 
doi:10.3390/s17102348 pmid:29036900 pmcid:PMC5677388 fatcat:m7e5dryjq5alxk45ztfhuk3vry

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be [article]

Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin
2017 arXiv   pre-print
Further, by clustering such collected data using machine learning technologies, we are able to compare academic views with the findings from industry and other sources, in an attempt to understand the  ...  Industry reports and academic work have revealed many attacks on IoT systems, resulting in privacy leakage, property loss and large-scale availability problems.  ...  INTRODUCTION The Internet of Things (IoT) is transforming many key industries.  ... 
arXiv:1703.09809v1 fatcat:chnaj5rnjvh5hnc42vsxwmqbq4

Trustworthy data-driven networked production for customer-centric plants

Davy Preuveneers, Wouter Joosen, Elisabeth Ilie-Zudor
2017 Industrial management & data systems  
the 20 manufacturing enterprise, while offering protection against malicious adversaries gaining unauthorized access to systems, services and information. 30 IoT devices and CPS in networked production  ...  This paper presents a solution for secure and trustworthy data management based on private blockchains 35 with capabilities for authenticating and authorizing users, things and services in IoT-enabled  ...  The Industrial Internet of Things (IIoT) and Industry 4.0 The Industrial IoT and Industry 4.0 envision improved operational efficiency in connected ecosystems of col-55 laborating humans, machines and  ... 
doi:10.1108/imds-10-2016-0419 fatcat:37gablqie5c7jn2ptwjvhfehsu

MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks [chapter]

Guorui Yu, Guangliang Yang, Tongxin Li, Xinhui Han, Shijie Guan, Jialong Zhang, Guofei Gu
2020 Communications in Computer and Information Science  
Instead, MinerGate focuses on the semantics of mining payloads (usually written in WebAssembly/asm.js), and semantic-based features.In our evaluation, we first verify the correctness of MinerGate by testing  ...  defense solution, called "MinerGate", against cryptojacking attacks.  ...  This project is supported by National Natural Science Foundation of China (No. 61972224).  ... 
doi:10.1007/978-981-33-4922-3_5 fatcat:y5pmp4dwmna5tjclwhw5qvxunu

A Review of Data Security Issues in Cloud Environment

Sahil Zatakiya, Pranav Tank
2013 International Journal of Computer Applications  
Cloud computing technology is becoming as the next generation architecture of IT industry. It offered many services over the internet.  ...  Today cloud computing is an attractive topic in field of Research and Development. It has many potential advantage and many enterprise applications and data are moving to public or hybrid cloud.  ...  Again, the same thing will occur and the adversary is successful in engaging the whole cloud system just by interrupting the usual processing of one server, in essence flooding the system.  ... 
doi:10.5120/14254-2352 fatcat:viguzaxsmneclmwaunx3l63qli

Blockchain-Envisioned Secure Authentication Approach in AIoT: Applications, Challenges, and Future Research

Mohammad Wazid, Ashok Kumar Das, Youngho Park, Jose Santa
2021 Wireless Communications and Mobile Computing  
The Artificial Intelligence of Things (AIoT) is the amalgamation of Artificial Intelligence (AI) methods and the Internet of Things (IoT) infrastructure, which are deployed there to improve the overall  ...  It is a digital ledger of transactions, which is duplicated and distributed across the entire network of computer systems. It stores data in the form of some blocks, which are then chained together.  ...  Various types of applications are supported from different domains such as IoT-enabled smart home, IoT-enabled smart city, Industrial Internet of Things-(IIoT-) enabled smart industry, and Internet of  ... 
doi:10.1155/2021/3866006 fatcat:m2uox7ksprgylabmayccocr4ti

An Efficient Scheme for Industrial Internet of Things Using Certificateless Signature

Ali Muhammad, Noor Ul Amin, Insaf Ullah, Ahmed Alsanad, Saddam Hussain, Suheer Al-Hadhrami, M. Irfan Uddin, Hizbullah Khattak, Muhammad Asghar Khan, Dilbag Singh
2021 Mathematical Problems in Engineering  
Currently, hyperelliptic curve cryptography (HECC) got attractions towards low power devices such as Industrial Internet of Things (IIoT).  ...  The presented approach is proven to be unforgeable against the challenges of type I and type II attackers.  ...  Given the use of wireless communications in IIoT environments, adversaries can contribute to sensitive data leakages.  ... 
doi:10.1155/2021/9960264 fatcat:7jsyzrvobrhivpgrpxayvog4ym

Intrusion Detection Protocols in Wireless Sensor Networks integrated to Internet of Things Deployment: Survey and Future Challenges

Sumit Pundir, Mohammad Wazid, D. P. Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park
2019 IEEE Access  
Because of this advancement, new computing and communication environment such as Internet of Things (IoT) came into picture.  ...  INDEX TERMS Wireless sensor network (WSN), Internet of Things (IoT), intrusion detection, cloud computing, fog computing, edge computing, security.  ...  of Internet of Things is provided in Fig. 4 .  ... 
doi:10.1109/access.2019.2962829 fatcat:mgodkcpnkrh7vliwaseufob7iq

IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques

Stefan Balogh, Ondrej Gallo, Roderik Ploszek, Peter Špaček, Pavol Zajac
2021 Electronics  
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed.  ...  finally the rise of artificial intelligence and evolution methods in the scope of security of IoT.  ...  Similar to the classical Internet, the Internet of Things is extremely complex. In the security domain, a core principle is to keep things simple.  ... 
doi:10.3390/electronics10212647 fatcat:g3khu7oh2vabddzz5dyne2n7ky

IoMT Malware Detection Approaches: Analysis and Research Challenges

Mohammad Wazid, Ashok Kumar Das, Joel J. P. C. Rodrigues, Sachin Shetty, Youngho Park
2019 IEEE Access  
INDEX TERMS Internet of Things (IoT), Internet of Medical Things (IoMT), security, IoT malware, malware detection.  ...  Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices.  ...  . • Industrial Internet of Things: The industrial Internet of Things (IIoT) is the combination of connecting machines and devices in industries (for example, electricity production, coal mining, oil, gas  ... 
doi:10.1109/access.2019.2960412 fatcat:cllmcvdqlzgs3b2xsbt6itzic4

Blockchain in internet of things: Challenges and Solutions [article]

Ali Dorri, Salil S. Kanhere, Raja Jurdak
2016 arXiv   pre-print
The Internet of Things IoT is experiencing exponential growth in research and industry, but it still suffers from privacy and security vulnerabilities.  ...  The proposed architecture is hierarchical, and consists of smart homes, an overlay network and cloud storages coordinating data transactions with BC to provide privacy and security.  ...  Introduction The Internet of Things (IoT) represents one of the most significant disruptive technologies of this century.  ... 
arXiv:1608.05187v1 fatcat:xe627p5bhrewxfpfhbldtzvz6y
« Previous Showing results 1 — 15 out of 1,192 results