2020
DOI: 10.1109/access.2020.3024784
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges and Cyber Forensic Ecosystem in IoT Driven BYOD Environment

Abstract: The usage of Internet of Things (IoT)/ Bring Your Own Devices (BYOD) has grown up exponentially, as expected 50 Billion IoT devices by the end of 2020 in the world in smart city environment. Advancement of Human Driven Edge Computing (HEC) with 5 th Generation Internet services also makes this more feasible. Use of IoT and increased demand of IoT/BYOD becomes one of the fundamental needs to increase the organization employee productivity and business agility. But it increased the significant risk of the cyber-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…In Equation (13), where () MLN represents the multilayer neural network, m  is the () MLN parameter, p is the output of the multilayer network, and  represents the K dimensional vector used for hybrid membership affiliation prediction. Given a batch of N samples and their affiliation predictions, 1 kK    the membership affiliation prediction formula for the estimated network is shown in Eq.…”
Section: ) Compression Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…In Equation (13), where () MLN represents the multilayer neural network, m  is the () MLN parameter, p is the output of the multilayer network, and  represents the K dimensional vector used for hybrid membership affiliation prediction. Given a batch of N samples and their affiliation predictions, 1 kK    the membership affiliation prediction formula for the estimated network is shown in Eq.…”
Section: ) Compression Networkmentioning
confidence: 99%
“…Through the use of these technologies, a variety of items are connected to the data tracking and information exchange so as to realize the identification and tracking of the target [12]. Literature [13] developed a strategy for security monitoring of IoT devices to monitor and identify malicious activities, which contributes to the shaping of the IoT cyber security ecosystem. Literature [14] conducted a qualitative threat assessment based on a historical database to prevent industrial IoT information from being threatened by malicious attacks on the network, which can effectively prevent data leakage and provide software malware detection.…”
Section: Introductionmentioning
confidence: 99%
“…These technological and access control regulations ought to be enforced, according to the corporation [21][22]. To lower threats to users and their devices, an efficient solution needs to work with the authorised BYOD's Windows versions [23][24][25]. Implement Access Control Guidelines The technical policy of the organisation that needs to be adhered to is referred to as this enforcement.…”
Section: ░ 2 Literature Reviewmentioning
confidence: 99%
“…The smart meters are employed in the AMI on the consumers' houses, which can be effortlessly reachable via the physical attackers for communicating with utility companies. This increases a new challenge for protecting the instruments [214].…”
Section: B Smart Grid Challengesmentioning
confidence: 99%