期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Navigating IoT Security:Insights into Architecture,Key Security Features,Attacks,Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity
1
作者 Ali Hassan N.Nizam-Uddin +3 位作者 Asim Quddus Syed Rizwan Hassan Ateeq Ur Rehman Salil Bharany 《Computers, Materials & Continua》 SCIE EI 2024年第12期3499-3559,共61页
Enhancing the interconnection of devices and systems,the Internet of Things(IoT)is a paradigm-shifting technology.IoT security concerns are still a substantial concern despite its extraordinary advantages.This paper o... Enhancing the interconnection of devices and systems,the Internet of Things(IoT)is a paradigm-shifting technology.IoT security concerns are still a substantial concern despite its extraordinary advantages.This paper offers an extensive review of IoT security,emphasizing the technology’s architecture,important security elements,and common attacks.It highlights how important artificial intelligence(AI)is to bolstering IoT security,especially when it comes to addressing risks at different IoT architecture layers.We systematically examined current mitigation strategies and their effectiveness,highlighting contemporary challenges with practical solutions and case studies from a range of industries,such as healthcare,smart homes,and industrial IoT.Our results highlight the importance of AI methods that are lightweight and improve security without compromising the limited resources of devices and computational capability.IoT networks can ensure operational efficiency and resilience by proactively identifying and countering security risks by utilizing machine learning capabilities.This study provides a comprehensive guide for practitioners and researchers aiming to understand the intricate connection between IoT,security challenges,and AI-driven solutions. 展开更多
关键词 Internet of Things(iot) artificial intelligence(AI) iot architecture SECURITY attacks in iot
在线阅读 下载PDF
Security Concerns with IoT Routing: A Review of Attacks, Countermeasures, and Future Prospects
2
作者 Ali M. A. Abuagoub 《Advances in Internet of Things》 2024年第4期67-98,共32页
Today’s Internet of Things (IoT) application domains are widely distributed, which exposes them to several security risks and assaults, especially when data is being transferred between endpoints with constrained res... Today’s Internet of Things (IoT) application domains are widely distributed, which exposes them to several security risks and assaults, especially when data is being transferred between endpoints with constrained resources and the backbone network. Numerous researchers have put a lot of effort into addressing routing protocol security vulnerabilities, particularly regarding IoT RPL-based networks. Despite multiple studies on the security of IoT routing protocols, routing attacks remain a major focus of ongoing research in IoT contexts. This paper examines the different types of routing attacks, how they affect Internet of Things networks, and how to mitigate them. Then, it provides an overview of recently published work on routing threats, primarily focusing on countermeasures, highlighting noteworthy security contributions, and drawing conclusions. Consequently, it achieves the study’s main objectives by summarizing intriguing current research trends in IoT routing security, pointing out knowledge gaps in this field, and suggesting directions and recommendations for future research on IoT routing security. 展开更多
关键词 iot Routing attacks RPL Security Resource attacks Topology attacks Traffic attacks
在线阅读 下载PDF
A Survey on Token Transmission Attacks,Effects,and Mitigation Strategies in IoT Devices
3
作者 Michael Juma Ayuma Shem Mbandu Angolo Philemon Nthenge Kasyoka 《Journal on Artificial Intelligence》 2025年第1期205-254,共50页
The exponential growth of Internet of Things(IoT)devices has introduced significant security challenges,particularly in securing token-based communication protocols used for authentication and authorization.This surve... The exponential growth of Internet of Things(IoT)devices has introduced significant security challenges,particularly in securing token-based communication protocols used for authentication and authorization.This survey systematically reviews the vulnerabilities in token transmission within IoT environments,focusing on various sophisticated attack vectors such as replay attacks,token hijacking,man-in-the-middle(MITM)attacks,token injection,and eavesdropping among others.These attacks exploit the inherent weaknesses of token-based mechanisms like OAuth,JSON Web Tokens(JWT),and bearer tokens,which are widely used in IoT ecosystems for managing device interactions and access control.The impact of such attacks is profound,leading to unauthorized access,data exfiltration,and control over IoT devices,posing significant threats to privacy,safety,and the operational integrity of critical IoT applications in sectors like healthcare,smart cities,and industrial automation.This paper categorizes these attack vectors,explores real-world case studies,and analyzes their effects on resource-constrained IoT devices that have limited processing power and memory,rendering them more susceptible to such exploits.Furthermore,this survey presents a comprehensive evaluation of existing mitigation techniques,including cryptographic protocols,lightweight secure transmission frameworks,secure token management practices,and network-layer defenses such as Transport Layer Security(TLS)and multi-factor authentication(MFA).The study also highlights the trade-offs between security and performance in IoT systems and identifies key gaps in current research,emphasizing the need for more scalable,energy-efficient,and robust security frameworks to address the evolving landscape of token transmission attacks in IoT devices. 展开更多
关键词 Token transmission iot attacks iot authentication cryptography encryption
在线阅读 下载PDF
An efficient self attention-based 1D-CNN-LSTM network for IoT attack detection and identification using network traffic
4
作者 Tinshu Sasi Arash Habibi Lashkari +2 位作者 Rongxing Lu Pulei Xiong Shahrear Iqbal 《Journal of Information and Intelligence》 2025年第5期375-400,共26页
In the last ten years,the IoT has played a crucial role in society's digital transformation.However,because of the wide range of devices it encompasses,it is also facing increased security vulnerabilities.This res... In the last ten years,the IoT has played a crucial role in society's digital transformation.However,because of the wide range of devices it encompasses,it is also facing increased security vulnerabilities.This research presents a novel mechanism called the self-attention-based 1D-CNN-LSTM,which uses convolutional neural networks(CNNs)combined with a long short-term memory(LSTM)model enhanced with a self-attention mechanism for detecting IoT attacks.The proposed mechanism achieves high accuracy and efficiently differentiates malicious and benign network traffic.By employing Shapley additive explanations(SHAP),we identified important predictive features from the preprocessed data,which were retrieved using CICFlowMeter.This has strengthened the dependability of the model.In addition,we enhanced the model by training it on a smaller collection of features,resulting in shorter training time while preserving accuracy.We have also generated nine augmented IoT tabular datasets named CIC-BCCCNRC_TabularIoTAttack-2024 from accessible IoT datasets to evaluate the model's robustness and showcase its efficacy in IoT security. 展开更多
关键词 iot attacks Machine learning Artificial intelligence iot attack detection
原文传递
Internet of Things: Towards a Solid Ecosystem of Interconnected Things 被引量:1
5
作者 Mohamad Chakroun Jinane Sayah +1 位作者 Chadi Kallab Samir Haddad 《Advances in Internet of Things》 2022年第3期35-64,共30页
The Internet of Things (IoT) is a technological revolution that has changed everything we do and given us a new perspective on our daily lives, but despite the fact that numerous publications have focused on character... The Internet of Things (IoT) is a technological revolution that has changed everything we do and given us a new perspective on our daily lives, but despite the fact that numerous publications have focused on characterizing the many edges and technologies that make up an IoT system, the IoT ecosystem is still seen as too complex to be recognized as a stand-alone environment due to its significant diversity;hence, the objective of this research is to address such a complex environment in a way that highlights its components and distinguishes them both individually and in relation to their broader context. Therefore, the definition of IoT and its emergence were discussed and organized around the timeline of Internet development phases demonstrating that IoT has been a need that has accompanied the presence of the Internet since its early stages, and then its growth and impact were discussed and highlighted with estimates and numbers. On the technical side, each of the following groups, IoT components, protocols, and architectures, was defined, discussed, and grouped in such a way that their intergroup organization, as well as their placement and contribution to the overall ecosystem, was highlighted. This, in addition to the various examples mentioned throughout the discussion, will provide the reader with a better understanding of the Internet of Things and how deeply it has become entwined in our daily lives and routines as a result of its numerous applications. 展开更多
关键词 Internet of Things iot Components iot Architectures iot Economic Impact iot Growth Networking Protocols TCP/IP iot Protocols iot Challenges iot attacks
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部