Security and Privacy Techniques in IoT Environment

Due to rapid technical advancements, many devices in the Internet of Things (IoT) environment, such as embedded systems, mobile devices, actuators, and sensors (all of which can be referred to as smart things), can receive huge amounts of information through data exchanging and interconnection [...].

[1]  Zhen Zuo,et al.  Intrusion Detection of UAVs Based on the Deep Belief Network Optimized by PSO , 2019, Sensors.

[2]  Gautam Srivastava,et al.  Realizing Efficient Security and Privacy in IoT Networks , 2020, Sensors.

[3]  Naima Iltaf,et al.  CATSWoTS: Context Aware Trustworthy Social Web of Things System , 2019, Sensors.

[4]  Xuan Li,et al.  A Novel Location Privacy-Preserving Approach Based on Blockchain , 2020, Sensors.

[5]  Po-Wen Chi,et al.  Privacy-Preserving Broker-ABE Scheme for Multiple Cloud-Assisted Cyber Physical Systems , 2019, Sensors.

[6]  Ahmed M. Mostafa,et al.  Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices , 2020, Sensors.

[7]  Younchan Jung,et al.  Integrated Management of Network Address Translation, Mobility and Security on the Blockchain Control Plane , 2020, Sensors.

[8]  Anna Felkner,et al.  Towards a Safer Internet of Things—A Survey of IoT Vulnerability Data Sources , 2020, Sensors.

[9]  Flavio Esposito,et al.  A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios , 2020, Sensors.

[10]  Saru Kumari,et al.  Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks , 2019, Sensors.

[11]  Tzung-Pei Hong,et al.  Efficient Algorithm for Mining Non-Redundant High-Utility Association Rules , 2020, Sensors.

[12]  Jorge Maestre Vidal,et al.  Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features , 2020, Sensors.

[13]  Hyunok Oh,et al.  Combinatorial Subset Difference—IoT-Friendly Subset Representation and Broadcast Encryption , 2020, Sensors.

[14]  Kangfeng Zheng,et al.  Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network , 2019, Sensors.

[15]  M Anwar Hossain,et al.  An Efficient Key Management Technique for the Internet of Things , 2020, Sensors.