2020
DOI: 10.4018/978-1-7998-2803-7.ch006
|View full text |Cite
|
Sign up to set email alerts
|

IoT Security

Abstract: The usage of the internet of things (IoT) devices is growing for the ease of life. From smart homes to smart cars, from smart transportation to smart cities, from smart hospitals to smart highways, these IoT devices send and receive highly sensitive data regarding the privacy of users or other information regarding the movement of users from one location to another location. The timing traces users when present at home and out of the home. But how does one secure this information from the attacker? There is a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…This is implemented for the security of a patient's privacy and data collected from these IoT devices. By following, these authors [70] recommended a method against device forging at the physical layer and security of data at transit or rest. Due to this system, it will be easy for the health department of any country to locate these patients or any other patients with different diseases.…”
Section: Resultsmentioning
confidence: 99%
“…This is implemented for the security of a patient's privacy and data collected from these IoT devices. By following, these authors [70] recommended a method against device forging at the physical layer and security of data at transit or rest. Due to this system, it will be easy for the health department of any country to locate these patients or any other patients with different diseases.…”
Section: Resultsmentioning
confidence: 99%
“…The obtained accuracy result is illustrated in Figure 4. The introduced ESCNN approach compared with existing research approaches such as Particle swarm optimization with gradient descent algorithm (PSO-Light) [30], genetic optimized deep belief network (GA-DBN) algorithm [33], Two-tier classification model, and dimension reduction algorithm (TT-DR) [34]. The above Table 3 clearly, indicates that the ESCNN approach recognizes the attacks with a maximum detection rate (98.9%).…”
Section: Accuracymentioning
confidence: 91%
“…Protocol Verification [33] The suspicious activities are predicted by checking the protocol field. However, the false-positive rate is produced due to the unspecified protocols.…”
mentioning
confidence: 99%