I'm searching for most recent areas in the IoT Cyber Security for my new research in Security.
I'm working on old research about IDS for IOT but i can't find any new areas about it.
Thanks.
Dear Mahmoud Abdel Aziz Elgindy,
IoT security is a very important and broad area. The various aspects are presented in numerous articles.
Here is a list of articles in which the IoT Secutity problem is presented relatively generally:
The file "Security Aspects in IoT" with a list of literature sources as attachment
A Literature Collection on Routing in the Internet of Things (IoT) with RPL - The Introduction
Part C: Different SecurityAspects in IoT
https://www.researchgate.net/publication/321965573_A_Literature_Collection_on_Routing_in_the_Internet_of_Things_IoT_with_RPL_-_The_Introduction
A Literature Collection on Routingin the Internet of Things (IoT) with RPLPart 1: RPL Framework
Part 1.3: RPL SecuritySupport
https://www.researchgate.net/publication/322211316_A_Literature_Collection_on_Routing_in_the_Internet_of_Things_IoT_with_RPL_-_Part_1_RPL_Framework
A Literature Collection on Routing in the Internet of Things (IoT) with RPLPart 2: RPL Extensions
Part 2.5: Security Extensions
https://www.researchgate.net/publication/321038248_A_Literature_Collection_on_Routing_in_the_Internet_of_Things_IoT_with_RPL_-_Part_2_RPL_Extensions
A Literature Collection on Routingin the Internet of Things (IoT) with RPLPart 3: RPL Analysis and Evaluation
Part 3.6: Security Analysis and Evaluation
https://www.researchgate.net/publication/322367185_A_Literature_Collection_on_Routing_in_the_Internet_of_Things_IoT_with_RPL_Part_3_RPL_Analysis_and_Evaluation
I hope that my literature sources will help determine "the latest areas of IoT security on the Internet".
Best regards and good luck
Anatol Badach
Hi Mahmoud,
Several attacks can target the RPL protocol such as Selective Forwarding, Version Number Change, HELLO Flood, Sinkhole, Blackhole, etc...
Raza et. al did a very good job in enumerating and simulating multiple RPL attacks on Cooja (Contiki simulator).
https://www.researchgate.net/publication/258398372_Routing_Attacks_and_Countermeasures_in_the_RPL-Based_Internet_of_Things
We developed an anomaly based IDS for RPL attacks. You can check our paper:
https://www.researchgate.net/publication/324888710_A_Self_Organizing_Map_Intrusion_Detection_System_for_RPL_Protocol_Attacks
Regards,
Elie.
IoT authentication, IoT encryption, IoT PKI, IoT security analytics, IoT API security…
Thank you very much.
Your opinions help me
Thanks Talal .
I'll read it
Probably, it is best idea to focus on a particular use case of IoT, such as vehicular cyber physical system or industrial IoT (IIOT).
or you can focus on challenges such as energy efficient light weight crypto.
Hello, My research in IOT's IDS. I want to know is there any prerequisites i should learn before i start my research ? I knew networks and some security fundamentals. I understood RPL and...
02 March 2019 6,391 7 View
I'm searching for Engineering Master Scholarship but i can't find one and didn't know where to ask and search. I'm searching for computer science specially in security field. I have finished...
05 June 2018 4,970 0 View
Hi I'm working on a research paper on IOT's security specially with Botnets. I need your help about advising me which area is better to focus on: * Honeypot for IOT Or * IDS for IOT Thank you...
09 October 2017 9,528 8 View
What's the future of Signature based IDS specially in #IoT with the new generation of AI attacks ? I'm building a new anomaly IDS for IOT with AI.
01 January 1970 7,309 0 View
Is there a powerful system for the security of the systems distributed on IoT systems?
02 March 2021 3,858 10 View
The Lanthanide contraction which is the decrease in ionic radii of the elements in the lanthanide series from atomic number 57, lanthanum, to 71, lutetium, is due to poor shielding of the 4f...
01 March 2021 2,272 4 View
I am working on developing a micromechanical FE model for predicting kink-band formation in UD composites. To model matrix plasticity, which model, out of Concrete Damaged Plasticity and...
28 February 2021 5,415 1 View
I am working on TiO2 composite material and the results of XRD have a lot of small/junk peaks and while I apply a smooth filter in Origin then the other characteristics peaks disappear so anyone...
26 February 2021 8,183 3 View
Hi, everyone I'm working on a privacy-preserving algorithm that will apply to IoT devices. So, I need to measure the power consumption by implementing this algorithm. Any suggestion, advice,...
25 February 2021 8,749 6 View
Im looking for any papers, reports,articles, links etc on information on How vulnerable is water and wastewater infrastructure to cyber terrorism in an age of IoT.
24 February 2021 2,750 4 View
My real system (buck converter) can only take an input of 0 to 1 (duty ratio) and I need to constrain the system so the controller action keeps within this bounds. How can I do this? The code for...
22 February 2021 2,125 3 View
Dear Research Gaters, Let me first add context to the question. I am looking to simulate the waste management system and resources of a city. The hardware devices I need to simulate include,...
21 February 2021 2,333 4 View
Is there any way to construct different initial filler shapes like triangle, square, rectangle, pillar, and tube in any simulation software.
20 February 2021 1,750 1 View
I am working on a university project so, I m looking for a good Simulator compatible with LoRa and LoRaWAN protocol to simulate an IoT scenario. Thanks in Advance
20 February 2021 6,352 6 View