2020
DOI: 10.3390/s20030844
|View full text |Cite
|
Sign up to set email alerts
|

Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems

Abstract: Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the way individuals and enterprises interact with the world. Although attacks on IoT devices are becoming more commonplace, security metrics often focus on software, network, and cloud security. For CPS systems employed in IoT applications, the implementation of hardware security is crucial. The identity of electronic circuits measured in terms of device parameters serves as a fingerprint. Estimating the parameters of this fin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(18 citation statements)
references
References 45 publications
0
18
0
Order By: Relevance
“…The SNN has been utilized by IDS to detect attacks on IoT devices by researchers due to its usage of less energy and achieving minimum latency in comparison with DNN. For instance, Johnson et al [28] used SNN and "glial cell" to detect the Trojan attack via using agreeable firing or "spiking rate" on IoT hardware devices. So, when the spiking rate value is not in the acceptable range that means the Trojan detection of the IoT device otherwise, no attack is identified in the IoT device.…”
Section: Related Workmentioning
confidence: 99%
“…The SNN has been utilized by IDS to detect attacks on IoT devices by researchers due to its usage of less energy and achieving minimum latency in comparison with DNN. For instance, Johnson et al [28] used SNN and "glial cell" to detect the Trojan attack via using agreeable firing or "spiking rate" on IoT hardware devices. So, when the spiking rate value is not in the acceptable range that means the Trojan detection of the IoT device otherwise, no attack is identified in the IoT device.…”
Section: Related Workmentioning
confidence: 99%
“…The proliferation of Information and Communication Technologies (ICTs) early in the 21st century has led to a revolution in our daily lives in which we are able to perform many tasks that were considered difficult with the use of available technologies at that time [ 1 ]. Progressively, this ICT has given birth to many advanced technologies, of which IoT can be considered as one such major technology [ 2 , 3 , 4 , 5 ]. Over the years, this IoT has been affiliated with many of the domains that are deemed important for human survival, such as agriculture, manufacturing, transportation, and healthcare [ 6 , 7 , 8 , 9 ].…”
Section: Introductionmentioning
confidence: 99%
“…Overall, the IoT is an ecosystem of connected devices that communicate with each other and exchange data. The integration of the IoT and the worldwide web has led to the creation of new kinds of services and applications in different domains, such as real-time surveillance, plant disease diagnosis, remote healthcare, real-time disease diagnosis, precision agriculture, air quality monitoring, and so on [ 1 , 2 , 3 , 4 , 5 , 12 , 13 , 14 , 15 , 16 ]. In general, IoT facilitates us to connect our digital belongings to the worldwide web, anytime, anywhere in the world [ 17 , 18 , 19 , 20 , 21 ], as depicted in Figure 1 .…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations