Altmetrics
Downloads
269
Views
93
Comments
0
This version is not peer-reviewed
Cyber-Physical Security for IoT Systems
Submitted:
06 November 2023
Posted:
08 November 2023
You are already at the latest version
( “Internet of Everything” OR “Internet of Things” OR “IoE” OR “IoT” )
AND
( “Solution” OR “Architecture” OR “Framework” OR “Platform” OR “System” OR “Threat” OR “Vulnerability” )
AND
( “Confidentiality” OR “Integrity” OR “Privacy” OR “Protection” OR “Security” OR “Trustworthiness” )
AND
( “5G” )
Population | Internet of Things, Internet of Everything, IoT, IoE |
Intervention | threat, vulnerability, solution |
Context | 5G |
Outcome | security, privacy, confidentiality, integrity, trustworthiness, protection |
Scientific Repository | URL |
---|---|
ACM Digital Library | http://dl.acm.org |
El Compendex | http://www.engineeringvillage.com |
IEEE Digital Library | http://ieeexplore.ieee.org |
Wiley Online Library | http://onlinelibrary.wiley.com |
Scopus | http://www.scopus.com |
Springer Link | http://link.springer.com |
Reference | Problem | Main Objective | Proposed Solution |
---|---|---|---|
Qiao et al. [50] | IoT security in the context of massive spectrum sharing. | Secure massive access. | A framework for securing cellular IoT networks. |
Qadri et al. [31] | SF and wormhole in the context of healthcare-IoT. | Secure patients’ data. | A blockchain-based cryptographic framework. |
Ozdemir et al. [32] | Security of social assistive robotics. | Secure implementation. | A framework of social assistive robotics. |
Vassilakis et al. [80] | Security in the context of multi-tenant MEC services. | Security analysis for virtualized small cell networks. | A framework for MEC in virtualised small cell networks. |
Dib et al. [109] | Emergence of IoT malware. | IoT malware classification. | A multi-dimensional deep learning framework. |
Ni et al. [67] | Security of network slicing and fog computing for 5G-IoT. | Authentication | Service-oriented authentication framework. |
Mohammed et al. [81] | Security in the context of 5G IoT HetNets. | Preserve security. | A framework based on deep reinforcement learning. |
Li et al. [82] | Security in the context of 5G-IoT systems. | Authentication. | Blockchain enabled zero-trust security framework. |
Krishnan et al. [111] | Security in the context of fog-to-things computing. | Detecting attacks. | An autonomic multilayer security framework. |
Huang et al. [83] | Security in the context of IoT. | Provide robust and transparent security protection. | A security framework. |
Lagkas et al. [84] | Security in the context of UAV. | Protect drones as things. | UAV IoT framework. |
Lawal et al. [112] | DDoS attacks in the context of IoT. | DDoS mitigation. | A framework for IoT using fog computing. |
Jaiswal et al. [113] | Security in the context of IoT. | Maximize the secrecy rate of IoT systems. | A secure framework. |
Rey et al. [110] | Malware in the context of IoT. | Malware detection. | A framework based on federated learning. |
Ramezan et al. [13] | Security in the context of multi-hop cellular networks. | Compare secure routing protocols. | An evaluation framework. |
Yadav et al. [24] | Vulnerabilities in the context of IoT. | Discover ways an attacker can breach a system. | A penetration testing framework. |
Lee et al. [29] | Security in the context of industrial IoT. | Improve security. | A method for a secure cryptographic system on a chip. |
Miloslavskaya et al. [85] | Security in the context of IoT ecosystems. | Information security incident management. | A blockchain-based system. |
Kwon et al. [28] | Eavesdropping in the context of 5G-IoT. | Detection of eavesdropping. | An intrusion detection system |
Miloslavskaya et al. [7] | Security in the context of IoT. | Improve security. | Applying the security intelligence approach. |
Sharma et al. [92] | Security in remote diagnosis of IoT devices. | Secure validation of IoT devices. | Fuzzy logic for safety decisions and remote diagnosis. |
Rim et al. [48] | DoS attacks in the context of 5G-IoT. | Detection and mitigation. | A system for defending and blocking attacks. |
Anisetti et al. [43] | Security in the context of IoT. | Security assessment. | IoT security checker. |
Mansour et al. [86] | Security in the context of smart interconnected networks. | Improve security. | Multi-layer security mechanism. |
Jain et al. [114] | Security in the context of IoT ecosystem. | Improve security. | An intrusion detection system and network slicing. |
Chitroub et al. [41] | Security in the context of IoT. | Secure mobile IoT deployment. | A solution based on the blind source separation method. |
Ahmed et al. [51] | APT in the context of IoT. | Detection of APT. | A data-driven approach to detecting APT stages. |
Rathee et al. [87] | Security of e-voting within IoT-oriented smart cities. | Improve security. | A secure e-voting mechanism based on blockchain. |
Srinivasu et al. [45] | Security in the context of 5G-IoT. | Secured healthcare data communication. | A blockchain-based approach. |
Shen et al. [58] | Security in the context of edge-assisted IoT. | Improve security. | A solution for the tradeoff between security and energy. |
Osman et al. [25] | Security in the context of smart home IoT networks. | Reduce the attack surface. | A microsegmentation-based approach. |
Hellaoui et al. [88] | Security in the context of 5G-IoT. | Provide optimized security levels. | An end-to-end adaptive approach. |
Yujia et al. [74] | Security in the context of IoT. | Improve security. | An authentication mechanism. |
Bordel et al. [89] | Security in the context of 5G-IoT. | Improve security. | A security mechanism. |
Garcia et al. [90] | Security in the context of heterogeneous IoT networks. | Improve security. | A handover roaming mechanism. |
Behrad et al. [40] | Security in the context of 5G-IoT. | Improve authentication and access control. | An authentication and access control mechanism. |
Aqrabi et al. [91] | Security in the context of industrial IoT. | Improve authentication. | Physically unclonable function and a multi-layer approach. |
Jung et al. [47] | Security in the context of IoT. | Improve security. | A secure gatekeeper system. |
He et al. [27] | Security of intelligent transportation systems. | Improve access control. | An access control mechanism based on risk prediction. |
Azad et al. [93] | Security in the context of IoT. | Improve authentication. | A self-enforcing authentication schema. |
Tang and Keoh [57] | Security in the context of home area networks. | Improve security. | A scheme to secure data. |
Lee et al. [116] | Security in the context of IoT. | Improve authentication. | A three-factor anonymous user authentication scheme. |
Ambareen et al. [72] | Security in the context of 5G-IoT D2D communication. | Protect user information and data. | A secure authentication scheme. |
Li et al. [117] | Security in the context of IoT applications. | Protect data. | Privacy preserving data aggregation scheme. |
Shin et al. [73] | Security in the context of 5G-IoT. | Improve security. | Authentication, authorization, and key agreement scheme. |
Yu et al. [56] | Security in the context of 5G NB-IoT. | Improve security. | Authentication and data transmission scheme. |
Choudhury [118] | Identity privacy. | Protect identity. | A lightweight scheme. |
Shin et al. [94] | Security of 5G and wireless sensor networks. | Improve security. | Two-factor authentication and key agreement scheme. |
Cao et al. [54] | Security in the context of 5G NB-IoT. | Improve security. | Authentication and data distribution scheme. |
Liu et al. [95] | Authentication in the context of crowdsourcing IoT. | Improve authentication. | Remote multi-factor authentication scheme. |
Lu et al. [132] | Security in the context of MTC and 5G-IoT. | Improve security. | Traffic-driven intrusion detection scheme. |
Kang et al. [122] | MITM attack in IoT networks. | Improve the detection. | A scheme using a hybrid routing mechanism. |
Wu et al. [62] | Authentication in the context of 5G-IoT. | Improve authentication. | An authentication protocol. |
Fan et al. [97] | Security in the context of 5G-IoT. | Improve authentication. | Ultralightweight NFC mutual authentication protocol. |
Zhang et al. [123] | Security in the context of mobile IoT. | Improve security. | Security trusted protocol model. |
Reference | Problem | Main Objective | Proposed Solution |
---|---|---|---|
Khumalo et al. [53] | Security in the context of IoT and D2D communication. | Improve security. | Group-based authentication and key agreement protocol. |
Fan et al. [98] | Authentication in the context of 5G-IoT. | Improve authentication. | RFID mutual authentication protocol. |
Das [99] | Security in the context of IoT. | Improve security. | Secure protocol for constrained environments. |
Lopes et al. [39] | Security in the context of MTC and IoT. | Improve security. | Authentication and key agreement protocol. |
Duguma et al. [100] | Security in the context of D2D and 5G. | Improve security. | Lightweight D2D security protocol. |
Xiao et al. [63] | Authentication in the context of 5G-IoT. | Improve authentication. | RFID lightweight authentication protocol. |
Shin et al. [101] | Security in the context of smart home IoT networks. | Improve security. | Security protocol for route optimization. |
Khalid et al. [8] | Authentication in the context of IoT. | Improve authentication. | Ultralightweight authentication protocol. |
Khalid et al. [96] | Authentication in the context of IoT. | Improve authentication. | Advance strong authentication strong integrity protocol. |
Sharma et al. [16] | Authentication in the context of IoT. | Improve authentication. | Secure authentication protocol. |
Nie et al. [131] | Security in the context of SDN-based IoT. | Improve security. | A differentially private tensor computing model. |
Anand et al. [64] | Malware attacks in 5G-IoT healthcare applications. | Malware detection. | CNN-based deep learning model. |
Zhang et al. [119] | Security in the context of industrial IoT. | Improve security. | Federated learning and transfer learning model. |
Rajawat et al. [102] | Security in the context of 5G-IoT. | Improve security. | Boltzmann machine-based encryption algorithm. |
Fu et al. [124] | Security in the context of 5G-IoT. | Improve detection. | Automata-based intrusion detection method. |
Laguduva et al. [125] | IoT edge node security. | Improve security. | A model to identify an original or cloned PUF. |
Mo [35] | Security in the context of industrial 5G-IoT. | Improve security. | A model for abnormal traffic detection. |
Krundyshev et al. [120] | Security in the context of smart infrastructures. | Cyber attack detection. | Artificial neural network models. |
Sadique et al. [3] | Data privacy in the context of IoT. | Protect data. | A model for data privacy enhancement. |
Rawal et al. [103] | Security in the context of IoT. | Improve security. | An interstitial model. |
Baniata et al. [130] | Security of fog-enabled mobile cloud computing. | Improve security. | A privacy-preserving model. |
Rezvy et al. [77] | Security in the context of 5G-IoT. | Intrusion classification and prediction. | A deep learning model. |
Ravi et al. [104] | Security in the context of 5G-IoT. | Analyze security aspects. | A testbed for security. |
Taimoor et al. [66] | Security of IoT-based personalized healthcare services. | Improve security. | A methodology for developing health services. |
Wang et al. [105] | Voice-transfer attack in industrial 5G-IoT. | Detection and mitigation. | A method for addressing voice-transfer attacks. |
Wang et al. [133] | Binary black-box adversarial attacks. | Improve malware detection. | An adversary sample generation method. |
Khan [115] | Security in the context of 5G-IoT. | Improve security. | ElGamal with public key infrastructure techniques. |
Sankar et al. [129] | Security in the context of beyond 5G and IoT. | Improve security. | Private blockchain in SDN and an authentication method. |
Catania et al. [128] | Privacy threats in the context of 5G-IoT. | Protect privacy. | An analysis methodology. |
Lee et al. [127] | Security of online identification process in 5G-IoT. | Improve security. | Transaction linkage technique. |
Sarac et al. [21] | Cyber-attacks on IoT devices. | Improve security. | Integrate security gateway architecture and blockchain. |
Holik [60] | Security in the context of IoT. | Improve security. | Protection techniques based on SDN. |
Lee et al. [121] | Android app-repackaging attacks on in-vehicle networks. | Mitigate the Android app-repackaging attacks. | A security technology as a countermeasure. |
Cheng et al. [126] | APT in the context of 5G-IoT. | Predict APT. | Method based on differentially private federated learning. |
Deebak et al. [107] | Security and privacy in the context of 5G-IoT. | Security and privacy preservation. | A blockchain-based lightweight distributed architecture. |
Alvarenga et al. [59] | Security in the context of IoT. | Secure management. | A hybrid distributed ledger architecture. |
Chopra et al. [42] | Security in the context of ultra-dense networks. | Improve security. | An architecture for security in ultra-dense networks. |
Mrabet et al. [23] | Security in the context of IoT. | Improve security. | An optimized architecture for IoT. |
Vangala et al. [108] | Security in IoT-enabled smart agriculture. | Improve security. | An architecture for smart farming. |
Szymanski [106] | Security in the context of industrial-tactile IoT. | Improve security. | A secure deterministic industrial-tactile IoT core network. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 MDPI (Basel, Switzerland) unless otherwise stated