IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT). There are social, economic, and commercial impacts of IoT on human lives. However, IoT nodes are generally power-constrained with data transmission using an open channel, i.e., Internet which opens the gates for various types of attacks on them. In this context, several efforts are initiated to deal with the evolving security issues in IoT systems and make them self-sufficient to harvest energy for smooth functioning. Motivated by these facts, in this paper, we explore the evolving vulnerabilities in IoT devices. We provide a state-of-the-art survey that addresses multiple dimensions of the IoT realm. Moreover, we provide a general overview of IoT, Sustainable IoT, its architecture, and the Internet Engineering Task Force (IETF) protocol suite. Subsequently, we explore the open-source tools and datasets for the proliferation in research and growth of IoT. A detailed taxonomy of attacks associated with various vulnerabilities is also presented in the text. Then we have specifically focused on the IoT Vulnerability Assessment techniques followed by a case study on sustainability of Smart Agriculture. Finally, this paper outlines the emerging challenges related to IoT and its sustainability, and opening the doors for the beginners to start research in this promising area.

[1]  Debayan Das,et al.  RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.

[2]  Qi Shi,et al.  Machine Learning Based Trust Computational Model for IoT Services , 2019, IEEE Transactions on Sustainable Computing.

[3]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[4]  L. Javier García-Villalba,et al.  SDN: Evolution and Opportunities in the Development IoT Applications , 2014, Int. J. Distributed Sens. Networks.

[5]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[6]  Deyu Zhang,et al.  Sustainability in Body Sensor Networks With Transmission Scheduling and Energy Harvesting , 2019, IEEE Internet of Things Journal.

[7]  Houbing Song,et al.  Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.

[8]  Fabiano Hessel,et al.  eCloudRFID - A mobile software framework architecture for pervasive RFID-based applications , 2011, J. Netw. Comput. Appl..

[9]  Mohammad S. Obaidat,et al.  HaBiTs: Blockchain-based Telesurgery Framework for Healthcare 4.0 , 2019, 2019 International Conference on Computer, Information and Telecommunication Systems (CITS).

[10]  Wei Ni,et al.  Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[11]  Yuval Elovici,et al.  Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things , 2017, IoTPTS@AsiaCCS.

[12]  Carsten Bormann,et al.  CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.

[13]  Sachin Kumar,et al.  The Role of Internet of Things and Smart Grid for the Development of a Smart City , 2018 .

[14]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[15]  Kartik Shankar,et al.  Alzheimer detection using Group Grey Wolf Optimization based features with convolutional classifier , 2019, Comput. Electr. Eng..

[16]  Sam Greydanus,et al.  Learning the Enigma with Recurrent Neural Networks , 2017, ArXiv.

[17]  Olivier Markowitch,et al.  A machine learning approach against a masked AES , 2014, Journal of Cryptographic Engineering.

[18]  Archan Misra,et al.  Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks , 2018, Computer.

[19]  Kim-Kwang Raymond Choo,et al.  Fog data analytics: A taxonomy and process model , 2019, J. Netw. Comput. Appl..

[20]  Mari Carmen Domingo,et al.  An overview of the Internet of Things for people with disabilities , 2012, J. Netw. Comput. Appl..

[21]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[22]  Liang Xiao,et al.  IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.

[23]  Kim-Kwang Raymond Choo,et al.  A lightweight machine learning-based authentication framework for smart IoT devices , 2019, Inf. Sci..

[24]  Tsutomu Matsumoto,et al.  IoTPOT: A Novel Honeypot for Revealing Current IoT Threats , 2016, J. Inf. Process..

[25]  Mamoun Alazab,et al.  A Visualized Botnet Detection System Based Deep Learning for the Internet of Things Networks of Smart Cities , 2020, IEEE Transactions on Industry Applications.

[26]  Neeraj Kumar,et al.  A taxonomy of blockchain-enabled softwarization for secure UAV network , 2020, Comput. Commun..

[27]  Andrzej Duda,et al.  OSCAR: Object security architecture for the Internet of Things , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[28]  Edgar Sánchez-Sinencio,et al.  A Switched Capacitor Energy Harvester Based on a Single-Cycle Criterion for MPPT to Eliminate Storage Capacitor , 2018, IEEE Transactions on Circuits and Systems I: Regular Papers.

[29]  M. M. A. Hashem,et al.  Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches , 2019, Internet Things.

[30]  Kim-Kwang Raymond Choo,et al.  Multimedia big data computing and Internet of Things applications: A taxonomy and process model , 2018, J. Netw. Comput. Appl..

[31]  Kim-Kwang Raymond Choo,et al.  An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.

[32]  Zhiyuan Tan,et al.  Design of multi-view based email classification for IoT systems via semi-supervised learning , 2019, J. Netw. Comput. Appl..

[33]  J. Jithish,et al.  Sybil attack in IOT: Modelling and defenses , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[34]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.

[35]  Bradley Reaves,et al.  An open virtual testbed for industrial control system security research , 2012, International Journal of Information Security.

[36]  Liang Xiao,et al.  Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.

[37]  Neeraj Kumar,et al.  Machine Learning Models for Secure Data Analytics: A taxonomy and threat model , 2020, Comput. Commun..

[38]  Grant Hernandez,et al.  Smart Nest Thermostat A Smart Spy in Your Home , 2014 .

[39]  Max Mühlhäuser,et al.  Multi-stage attack detection and signature generation with ICS honeypots , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[40]  Vasaka Visoottiviseth,et al.  PENTOS: Penetration testing tool for Internet of Thing devices , 2017, TENCON 2017 - 2017 IEEE Region 10 Conference.

[41]  Saurabh Bagchi,et al.  TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices , 2017, IEEE Internet Computing.

[42]  Bryan Scotney,et al.  Smart City Architecture and its Applications Based on IoT , 2015, ANT/SEIT.

[43]  Fabiano Hessel,et al.  The importance of a standard securit y archit ecture for SOA-based iot middleware , 2015, IEEE Communications Magazine.

[44]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[45]  Ali Feizollah,et al.  Evaluation of machine learning classifiers for mobile malware detection , 2014, Soft Computing.

[46]  Peter Friess,et al.  Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .

[47]  Sudip Mittal,et al.  Security and Privacy in Smart Farming: Challenges and Opportunities , 2020, IEEE Access.

[48]  Brij B. Gupta,et al.  An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols , 2018, Concurr. Comput. Pract. Exp..

[49]  Priyanka Sharma,et al.  Blockchain-Based Remote Patient Monitoring in Healthcare 4.0 , 2019, 2019 IEEE 9th International Conference on Advanced Computing (IACC).

[50]  Yuval Elovici,et al.  N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.

[51]  Márk Félegyházi,et al.  CryPLH: Protecting Smart Energy Systems from Targeted Attacks with a PLC Honeypot , 2014, SmartGridSec.

[52]  Srikanth Kandula,et al.  Dynamic load balancing without packet reordering , 2007, CCRV.

[53]  Michael Schukat,et al.  A ZigBee honeypot to assess IoT cyberattack behaviour , 2017, 2017 28th Irish Signals and Systems Conference (ISSC).

[54]  Mário M. Freire,et al.  Challenges of securing Internet of Things devices: A survey , 2018, Secur. Priv..

[55]  Wade Trappe,et al.  Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.

[56]  Qiang Yang,et al.  A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.

[57]  Shashank Gupta,et al.  Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects , 2020, Int. J. Commun. Syst..

[58]  Brahmjit Singh,et al.  Lightweight Cryptography: A Solution to Secure IoT , 2020, Wirel. Pers. Commun..

[59]  Ali Saman Tosun,et al.  A Testbed for Security and Privacy Analysis of IoT Devices , 2016, 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[60]  Matti Latva-aho,et al.  Massive Wireless Energy Transfer: Enabling Sustainable IoT Toward 6G Era , 2019, IEEE Internet of Things Journal.

[61]  Yulia Cherdantseva,et al.  Secure*BPMN : a graphical extension for BPMN 2.0 based on a reference model of information assurance & security , 2014 .

[62]  Zhonghao Sun,et al.  Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface , 2019, IEEE Access.

[63]  Sabu M. Thampi,et al.  A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations , 2018, IEEE Access.

[64]  Yier Jin,et al.  Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.

[65]  Yuval Elovici,et al.  SIPHON: Towards Scalable High-Interaction Physical Honeypots , 2017, CPSS@AsiaCCS.

[66]  Sami Khairy,et al.  Sustainable Wireless IoT Networks With RF Energy Charging Over Wi-Fi (CoWiFi) , 2019, IEEE Internet of Things Journal.

[67]  Lav Gupta,et al.  Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things , 2019, IEEE Internet of Things Journal.

[68]  Mahdi Aiash,et al.  Machine Learning Based Botnet Identification Traffic , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[69]  Juan Lopez,et al.  Firmware modification attacks on programmable logic controllers , 2013, Int. J. Crit. Infrastructure Prot..

[70]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[71]  Mobasshir Mahbub,et al.  Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics , 2020, J. Netw. Comput. Appl..

[72]  Yan Zhang,et al.  Software Defined Networking for Energy Harvesting Internet of Things , 2018, IEEE Internet of Things Journal.

[73]  Lionel C. Briand,et al.  Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning , 2015, IEEE Transactions on Dependable and Secure Computing.

[74]  Samiran Chattopadhyay,et al.  Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks , 2018, IEEE Access.

[75]  Rajesh Gupta,et al.  Blockchain envisioned UAV networks: Challenges, solutions, and comparisons , 2020, Comput. Commun..

[76]  Usha Devi Gandhi,et al.  A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases , 2017, Comput. Electr. Eng..

[77]  Taghi M. Khoshgoftaar,et al.  A survey on heterogeneous transfer learning , 2017, Journal of Big Data.

[78]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[79]  Athanasios V. Vasilakos,et al.  A Multi-Tenant Cloud-Based DC Nano Grid for Self-Sustained Smart Buildings in Smart Cities , 2017, IEEE Communications Magazine.

[80]  Daniel W. Engels,et al.  A secure IoT architecture for Smart Cities , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[81]  Mohammad Sayad Haghighi,et al.  Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[82]  Gang Xu,et al.  Blockchain and Edge Computing Based Vehicle-to-Grid Energy Trading in Energy Internet , 2018, 2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2).

[83]  Sudeep Tanwar,et al.  A taxonomy of blockchain envisioned edge‐as‐a‐connected autonomous vehicles , 2020, Trans. Emerg. Telecommun. Technol..

[84]  Ian Richardson,et al.  Smart meter data: Balancing consumer privacy concerns with legitimate applications , 2012 .

[85]  Hsinchun Chen,et al.  Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT) , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[86]  Ali Nauman,et al.  Smart Contract Privacy Protection Using AI in Cyber-Physical Systems: Tools, Techniques and Challenges , 2020, IEEE Access.

[87]  Kamalakanta Mahapatra,et al.  Eternal-Thing: A Secure Aging-Aware Solar-Energy Harvester Thing for Sustainable IoT , 2021, IEEE Transactions on Sustainable Computing.

[88]  Kaoru Ota,et al.  Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks , 2020, J. Parallel Distributed Comput..

[89]  Thomas Noël,et al.  Using SensLAB as a First Class Scientific Tool for Large Scale Wireless Sensor Network Experiments , 2011, Networking.

[90]  R. Vinayakumar,et al.  A hybrid deep learning image-based analysis for effective malware detection , 2019, J. Inf. Secur. Appl..

[91]  Joel J. P. C. Rodrigues,et al.  A lifetime extended multi-levels heterogeneous routing protocol for wireless sensor networks , 2015, Telecommun. Syst..

[92]  Naveen K. Chilamkurti,et al.  Bayesian coalition game for the internet of things: an ambient intelligence-based evaluation , 2015, IEEE Communications Magazine.

[93]  Zhenkai Liang,et al.  A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[94]  Amin Azmoodeh,et al.  Graph embedding as a new approach for unknown malware detection , 2017, Journal of Computer Virology and Hacking Techniques.

[95]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[96]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[97]  Qi Alfred Chen,et al.  ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms , 2017, NDSS.

[98]  Neeraj Kumar,et al.  A taxonomy of AI techniques for 6G communication networks , 2020, Comput. Commun..

[99]  Syed Ali Hassan,et al.  Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.

[100]  Hannu Tenhunen,et al.  International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .

[101]  Anna N. Kim,et al.  When HART goes wireless: Understanding and implementing the WirelessHART standard , 2008, 2008 IEEE International Conference on Emerging Technologies and Factory Automation.

[102]  Neeraj Kumar,et al.  Verification and validation techniques for streaming big data analytics in internet of things environment , 2018, IET Networks.

[103]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[104]  B. M. Patil,et al.  Vampire Attack: Draining Life from Wireless Ad –hoc Sensor Networks , 2016 .

[105]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[106]  Raheem A. Beyah,et al.  Rethinking the Honeypot for Cyber-Physical Systems , 2016, IEEE Internet Computing.

[107]  Alina M. Chircu,et al.  SECURING THE INTERNET OF THINGS : A REVIEW , 2016 .

[108]  Mahmoud Al-Ayyoub,et al.  SDIoT: a software defined based internet of things framework , 2015, Journal of Ambient Intelligence and Humanized Computing.

[109]  Rajesh Gupta,et al.  Blockchain and AI amalgamation for energy cloud management: Challenges, solutions, and future directions , 2020, J. Parallel Distributed Comput..

[110]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[111]  J. Y. Keller,et al.  Monitoring of stealthy attack in networked control systems , 2013, 2013 Conference on Control and Fault-Tolerant Systems (SysTol).

[112]  Sudeep Tanwar,et al.  Facial Sentiment Analysis Using AI Techniques: State-of-the-Art, Taxonomies, and Challenges , 2020, IEEE Access.

[113]  Asaf Shabtai,et al.  Advanced Security Testbed Framework for Wearable IoT Devices , 2016, ACM Trans. Internet Techn..

[114]  Robin Tommy,et al.  Automatic Detection and Correction of Vulnerabilities using Machine Learning , 2017, 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC).

[115]  Igor Santos,et al.  Opcode sequences as representation of executables for data-mining-based unknown malware detection , 2013, Inf. Sci..

[116]  Hui Shao,et al.  The Design of a Micro Power Management System for Applications Using Photovoltaic Cells With the Maximum Output Power Control , 2009, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[117]  Joel J. P. C. Rodrigues,et al.  Home-based exercise system for patients using IoT enabled smart speaker , 2017, 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom).

[118]  Igor Kotenko,et al.  Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning , 2018, IEEE Access.

[119]  Neeraj Kumar,et al.  Tactile internet and its applications in 5G era: A comprehensive review , 2019, Int. J. Commun. Syst..

[120]  Hong Wen,et al.  The Efficient BackFi Transmission Design in Ambient Backscatter Communication Systems for IoT , 2019, IEEE Access.

[121]  H. T. Kung,et al.  Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[122]  Shiuh-Pyng Shieh,et al.  Penetration Testing in the IoT Age , 2018, Computer.

[123]  Evangelos Theodoridis,et al.  SmartSantander: IoT experimentation over a smart city testbed , 2014, Comput. Networks.

[124]  Xiangjian He,et al.  A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.

[125]  George Markowsky,et al.  Scanning for vulnerable devices in the Internet of Things , 2015, 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[126]  Minoo Naebe,et al.  Towards a Green and Self-Powered Internet of Things Using Piezoelectric Energy Harvesting , 2017, IEEE Access.

[127]  Taeeun Kim,et al.  Management platform of threats information in IoT environment , 2018, J. Ambient Intell. Humaniz. Comput..

[128]  Peiyuan Zong,et al.  Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be , 2017, ArXiv.

[129]  Angelo Furfaro,et al.  Using virtual environments for the assessment of cybersecurity issues in IoT scenarios , 2017, Simul. Model. Pract. Theory.

[130]  Ali Dehghantanha,et al.  A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[131]  Nasir Ghani,et al.  Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.

[132]  Hwee Pink Tan,et al.  Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.

[133]  François-Xavier Standaert,et al.  Introduction to Side-Channel Attacks , 2010, Secure Integrated Circuits and Systems.

[134]  Baojiang Cui,et al.  A Novel Fuzzing Method for Zigbee Based on Finite State Machine , 2014, Int. J. Distributed Sens. Networks.

[135]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[136]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[137]  Ali Dehghantanha,et al.  Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.

[138]  Pramode K. Verma,et al.  Predicting user comfort level using machine learning for Smart Grid environments , 2011, ISGT 2011.

[139]  Neeraj Kumar,et al.  Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review , 2020, Comput. Electr. Eng..

[140]  Jong Hyuk Park,et al.  Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..

[141]  Gunasekaran Manogaran,et al.  HIoTPOT: Surveillance on IoT Devices against Recent Threats , 2018, Wirel. Pers. Commun..

[142]  Yi-Chun Shih,et al.  An Inductorless DC–DC Converter for Energy Harvesting With a 1.2-$ \mu\hbox{W}$ Bandgap-Referenced Output Controller , 2011, IEEE Transactions on Circuits and Systems II: Express Briefs.

[143]  Rong Zheng,et al.  Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.

[144]  Hongseok Kim,et al.  Deep neural network based demand side short term load forecasting , 2016, 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[145]  Mohammad S. Obaidat,et al.  A systematic review on security issues in vehicular ad hoc network , 2018, Secur. Priv..

[146]  Ashish Khanna,et al.  APD-JFAD: Accurate Prevention and Detection of Jelly Fish Attack in MANET , 2018, IEEE Access.

[147]  R. B. Patel,et al.  Capacity and interference aware link scheduling with channel assignment in wireless mesh networks , 2011, J. Netw. Comput. Appl..

[148]  Olivier Festor,et al.  A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[149]  Anantha Chandrakasan,et al.  eeDTLS: Energy-Efficient Datagram Transport Layer Security for the Internet of Things , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[150]  Peter Washington,et al.  Feasibility Testing of a Wearable Behavioral Aid for Social Learning in Children with Autism , 2018, Applied Clinical Informatics.

[151]  Yuval Elovici,et al.  POSTER: Towards Exposing Internet of Things: A Roadmap , 2016, CCS.

[152]  E. A. Jasmin,et al.  Residential Load Scheduling With Renewable Generation in the Smart Grid: A Reinforcement Learning Approach , 2019, IEEE Systems Journal.

[153]  Suat Özdemir,et al.  Security in internet of things: A survey , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).

[154]  Marc Joye,et al.  Privacy and security: Key requirements for sustainable IoT growth , 2017, 2017 Symposium on VLSI Technology.

[155]  Mikko Hypponen,et al.  The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation , 2017 .

[156]  Neeraj Kumar,et al.  Fog computing for Healthcare 4.0 environment: Opportunities and challenges , 2018, Comput. Electr. Eng..

[157]  Athanasios V. Vasilakos,et al.  An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks , 2017, Comput. Electr. Eng..

[158]  Ahmed Dawoud,et al.  Deep learning and software-defined networks: Towards secure IoT architecture , 2018, Internet Things.

[159]  Mehdi Ferdowsi,et al.  A High-Voltage-Gain DC–DC Converter Based on Modified Dickson Charge Pump Voltage Multiplier , 2017, IEEE Transactions on Power Electronics.

[160]  Andrew G. Barto,et al.  Adaptive Control of Duty Cycling in Energy-Harvesting Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[161]  Igor Bisio,et al.  Enabling IoT for In-Home Rehabilitation: Accelerometer Signals Classification Methods for Activity and Movement Recognition , 2017, IEEE Internet of Things Journal.

[162]  Mohammad S. Obaidat,et al.  TILAA: Tactile Internet-based Ambient Assistant Living in fog environment , 2019, Future Gener. Comput. Syst..

[163]  Gabi Nakibly,et al.  PowerSpy: Location Tracking Using Mobile Device Power Analysis , 2015, USENIX Security Symposium.

[164]  Yuval Elovici,et al.  Security Testbed for Internet-of-Things Devices , 2019, IEEE Transactions on Reliability.