Get Scholarly Articles for Free

Harvard Library has paid for your access to hundreds of websites — from the New York Review of Books to the Oxford English Dictionary to the journal Nature: Chemical Biology . You just need to connect via HarvardKey.

The library offers many tools to quickly check if you have free online access. Each tool has features that you may find helpful at different times. Most people mix and match for different purposes. Find the one that's right for you.

Google Scholar

Get access directly from Google Scholar results.

  • Adds the "Try Harvard Library" link to your Google Scholar results
  • Selects the best access point for you

Browser Extensions

Adding a browser extension is a way to get articles Harvard Library pays for - no matter what website you're using.

Lean Library

Install the Lean Library plugin to automate access.

  • Checks every website that you visit and reloads via Harvard Key automatically
  • Notifies you if an ebook or online article is available via Harvard
  • No action required: Lean Library is always working in the background
  • May sign you out of personally subscribed accounts

Check Harvard Library Bookmarklet

Get one-click access with the Check Harvard Library Bookmark.

  • Works on most browsers, including on your phone
  • Reloads the page you're on via Harvard Key
  • You're in control: use the bookmark when you want to check for access

Check Harvard Library Bookmark

Stay current with your favorite academic journals, preview the table of contents, and never miss a new article. Harvard Library offers free accounts.

Library Access via VPN

Harvard vpn.

Don't want to keep logging in using HarvardKey? Searching for articles while abroad? You can get the same access as a campus computer by installing and configuring a Harvard VPN.

  • Generally removes the need to log in to Harvard Key
  • Some sites won't recognize VPN, some sites only work on VPN
  • Can be helpful for access outside of the United States

Instructions on how to install the VPN client (via HUIT)

Ask a Librarian

Looking for another type of access or free articles? Find answers to commonly asked questions and ask your own. Library staff members are also available via chat during posted hours.

15 Best Websites to Download Research Papers for Free

Best Websites to Download Research Papers for Free

Is your thirst for knowledge limited by expensive subscriptions? Explore the best websites to download research papers for free and expand your academic reach.

With paywalls acting like impenetrable fortresses, accessing scholarly articles becomes a herculean task. However, a beacon of hope exists in the form of free-access platforms, quenching our thirst for intellectual wisdom. Let’s set sail on this scholarly journey.

Table of Contents

Today’s champions of academia aren’t just about offering free access, they uphold ethics and copyright respectability. Let’s delve into these repositories that are reshaping the academia world. You can download free research papers from any of the following websites.

Best Websites to Download Research Papers

#1. sci-hub – best for accessing paywalled academic papers.

Despite its contentious standing, Sci-Hub offers an invaluable service to knowledge-seekers. While navigating the tightrope between access and legality, it represents a game-changing force in the world of academic research.

Source: https://www.sci-hub.se

#2. Library Genesis (Libgen) – Best for a Wide Range of Books and Articles

It’s not just a repository, but a vibrant confluence of multiple disciplines and interests, catering to the unique intellectual appetite of each knowledge seeker.

What are the benefits of Libgen?

Source: https://libgen.is

#3. Unpaywall – Best for Legal Open Access Versions of Scholarly Articles

What are the benefits of Unpaywall?

#4. Directory of Open Access Journals (DOAJ) – Best for Peer-Reviewed Open Access Journals

Source: https://doaj.org

#5. Open Access Button – Best for Free Versions of Paywalled Articles

What are the benefits of Open Access Button?

#6. Science Open – Best for a Wide Variety of Open Access Scientific Research

Consider Science Open as a bustling town square in the city of scientific knowledge, where scholars from all walks of life gather, discuss, and dissect over 60 million articles. 

You might also like:

#7. CORE – Best for Open Access Content Across Disciplines

With its unparalleled aggregation and comprehensive access, CORE embodies the grand orchestra of global research. It stands as an essential tool in the modern researcher’s toolkit.

#8. ERIC – Best for Education Research

What are the benefits of ERIC?

#9. PaperPanda – Best for Free Access to Research Papers

It’s like having a personal research assistant, guiding you through the maze of scholarly literature.

#10. Citationsy Archives – Best for Research Papers from Numerous Fields

Source: https://citationsy.com

#11. OA.mg – Best for Direct Download Links to Open Access Papers

Source: https://oa.mg

#12. Social Science Research Network (SSRN) – Best for Social Sciences and Humanities Research

SSRN serves as an invaluable resource for researchers in the social sciences and humanities, fostering a community that drives innovation and advancements in these fields.

#13. Project Gutenberg – Best for Free Access to eBooks

Project Gutenberg serves as a testament to the power of literature and the accessibility of knowledge. It enables readers worldwide to embark on intellectual journeys through its extensive collection of free eBooks.

#14. PLOS (Public Library of Science) – Best for Open Access to Scientific and Medical Research

As a leading publisher of open access research, PLOS fosters the dissemination of cutting-edge scientific discoveries to a global audience. 

#15. arXiv.org – Best for Preprints in Science, Mathematics, and Computer Science

In a world where knowledge is king, accessing a research paper shouldn’t feel like an impossible task. Thanks to these free and innovative websites, we can escape the barriers of paywalls and dive into a vast ocean of intellectual wealth. 

Leave a Comment Cancel reply

“The only truly modern academic research engine”

Oa.mg is a search engine for academic papers, specialising in open access. we have over 250 million papers in our index..

  • Mission and history
  • Platform features
  • Library Advisory Group
  • What’s in JSTOR
  • For Librarians
  • For Publishers

Open and free content on JSTOR and Artstor

Our partnerships with libraries and publishers help us make content discoverable and freely accessible worldwide

Search open content on JSTOR

Explore our growing collection of Open Access journals

Early Journal Content , articles published prior to the last 95 years in the United States, or prior to the last 143 years if initially published internationally, are freely available to all

Even more content is available when you register to read – millions of articles from nearly 2,000 journals

Thousands of Open Access ebooks are available from top scholarly publishers, including Brill, Cornell University Press, University College of London, and University of California Press – at no cost to libraries or users.

This includes Open Access titles in Spanish:

  • Collaboration with El Colegio de México
  • Partnership with the Latin American Council of Social Sciences

Images and media

JSTOR hosts a growing number of public collections , including Artstor’s Open Access collections , from museums, archives, libraries, and scholars worldwide.

Research reports

A curated set of more than 34,000 research reports from more than 140 policy institutes selected with faculty, librarian, and expert input.

Resources for librarians

Open content title lists:

  • Open Access Journals (xlsx)
  • Open Access Books (xlsx)
  • JSTOR Early Journal Content (txt)
  • Research Reports

Open Access ebook resources for librarians

Library-supported collections

Shared Collections : We have a growing corpus of digital special collections published on JSTOR by our institutional partners.

Reveal Digital : A collaboration with libraries to fund, source, digitize and publish open access primary source collections from under-represented voices.

JSTOR Daily

JSTOR Daily is an online publication that contextualizes current events with scholarship. All of our stories contain links to publicly accessible research on JSTOR. We’re proud to publish articles based in fact and grounded by careful research and to provide free access to that research for all of our readers.

🇺🇦    make metadata, not war

A comprehensive bibliographic database of the world’s scholarly literature

The world’s largest collection of open access research papers, machine access to our vast unique full text corpus, core features, indexing the world’s repositories.

We serve the global network of repositories and journals

Comprehensive data coverage

We provide both metadata and full text access to our comprehensive collection through our APIs and Datasets

Powerful services

We create powerful services for researchers, universities, and industry

Cutting-edge solutions

We research and develop innovative data-driven and AI solutions

Committed to the POSI

Cost-free PIDs for your repository

OAI identifiers are unique identifiers minted cost-free by repositories. Ensure that your repository is correctly configured, enabling the CORE OAI Resolver to redirect your identifiers to your repository landing pages.

OAI IDs provide a cost-free option for assigning Persistent Identifiers (PIDs) to your repository records. Learn more.

Who we serve?

Enabling others to create new tools and innovate using a global comprehensive collection of research papers.

Companies

“ Our partnership with CORE will provide Turnitin with vast amounts of metadata and full texts that we can ... ” Show more

Gareth Malcolm, Content Partner Manager at Turnitin

Academic institutions.

Making research more discoverable, improving metadata quality, helping to meet and monitor open access compliance.

Academic institutions

“ CORE’s role in providing a unified search of repository content is a great tool for the researcher and ex... ” Show more

Nicola Dowson, Library Services Manager at Open University

Researchers & general public.

Tools to find, discover and explore the wealth of open access research. Free for everyone, forever.

Researchers & general public

“ With millions of research papers available across thousands of different systems, CORE provides an invalu... ” Show more

Jon Tennant, Rogue Paleontologist and Founder of the Open Science MOOC

Helping funders to analyse, audit and monitor open research and accelerate towards open science.

Funders

“ Aggregation plays an increasingly essential role in maximising the long-term benefits of open access, hel... ” Show more

Ben Johnson, Research Policy Adviser at Research England

Our services, access to raw data.

Create new and innovative solutions.

Content discovery

Find relevant research and make your research more visible.

Managing content

Manage how your research content is exposed to the world.

Companies using CORE

Gareth Malcolm

Gareth Malcolm

Content Partner Manager at Turnitin

Our partnership with CORE will provide Turnitin with vast amounts of metadata and full texts that we can utilise in our plagiarism detection software.

Academic institution using CORE

Kathleen Shearer

Executive Director of the Confederation of Open Access Repositories (COAR)

CORE has significantly assisted the academic institutions participating in our global network with their key mission, which is their scientific content exposure. In addition, CORE has helped our content administrators to showcase the real benefits of repositories via its added value services.

Partner projects

Ben Johnson

Ben Johnson

Research Policy Adviser

Aggregation plays an increasingly essential role in maximising the long-term benefits of open access, helping to turn the promise of a 'research commons' into a reality. The aggregation services that CORE provides therefore make a very valuable contribution to the evolving open access environment in the UK.

logo

This website uses cookies to ensure you get the best experience. Learn more about DOAJ’s privacy policy.

Hide this message

You are using an outdated browser. Please upgrade your browser to improve your experience and security.

The Directory of Open Access Journals

Directory of Open Access Journals

Find open access journals & articles.

Doaj in numbers.

80 languages

134 countries represented

13,718 journals without APCs

20,862 journals

10,462,556 article records

Quick search

About the directory.

DOAJ is a unique and extensive index of diverse open access journals from around the world, driven by a growing community, and is committed to ensuring quality content is freely available online for everyone.

DOAJ is committed to keeping its services free of charge, including being indexed, and its data freely available.

→ About DOAJ

→ How to apply

DOAJ is twenty years old in 2023.

Fund our 20th anniversary campaign

DOAJ is independent. All support is via donations.

82% from academic organisations

18% from contributors

Support DOAJ

Publishers don't need to donate to be part of DOAJ.

News Service

Meet the doaj team: head of editorial and deputy head of editorial (quality), vacancy: operations manager, press release: pubscholar joins the movement to support the directory of open access journals, new major version of the api to be released.

→ All blog posts

We would not be able to work without our volunteers, such as these top-performing editors and associate editors.

→ Meet our volunteers

Librarianship, Scholarly Publishing, Data Management

Brisbane, Australia (Chinese, English)

Adana, Türkiye (Turkish, English)

Humanities, Social Sciences

Natalia Pamuła

Toruń, Poland (Polish, English)

Medical Sciences, Nutrition

Pablo Hernandez

Caracas, Venezuela (Spanish, English)

Research Evaluation

Paola Galimberti

Milan, Italy (Italian, German, English)

Social Sciences, Humanities

Dawam M. Rohmatulloh

Ponorogo, Indonesia (Bahasa Indonesia, English, Dutch)

Systematic Entomology

Kadri Kıran

Edirne, Türkiye (English, Turkish, German)

Library and Information Science

Nataliia Kaliuzhna

Kyiv, Ukraine (Ukrainian, Russian, English, Polish)

Recently-added journals

DOAJ’s team of managing editors, editors, and volunteers work with publishers to index new journals. As soon as they’re accepted, these journals are displayed on our website freely accessible to everyone.

→ See Atom feed

→ A log of journals added (and withdrawn)

→ DOWNLOAD all journals as CSV

  • International Journal of Industry and Sustainable Development
  • Health Economics and Management Review
  • Discover Civil Engineering
  • Helwan International Journal for Nursing Research and Practice
  • International Journal of Intelligent Computing and Information Sciences
  • Ovozoa: Journal of Animal Reproduction
  • Sakarya Üniversitesi Kadın Araştırmaları Dergisi
  • Yakın Doğu Üniversitesi İlahiyat Fakültesi Dergisi
  • Journal Geuthee of Engineering and Energy
  • Andares: Revista de Derechos Humanos y de la Naturaleza
  • Liaoning Shiyou Huagong Daxue xuebao
  • npj Women's Health
  • 河南理工大学学报. 自然科学版

WeChat QR code

how to access research papers for free

Reference management. Clean and simple.

The top list of academic search engines

academic search engines

1. Google Scholar

4. science.gov, 5. semantic scholar, 6. baidu scholar, get the most out of academic search engines, frequently asked questions about academic search engines, related articles.

Academic search engines have become the number one resource to turn to in order to find research papers and other scholarly sources. While classic academic databases like Web of Science and Scopus are locked behind paywalls, Google Scholar and others can be accessed free of charge. In order to help you get your research done fast, we have compiled the top list of free academic search engines.

Google Scholar is the clear number one when it comes to academic search engines. It's the power of Google searches applied to research papers and patents. It not only lets you find research papers for all academic disciplines for free but also often provides links to full-text PDF files.

  • Coverage: approx. 200 million articles
  • Abstracts: only a snippet of the abstract is available
  • Related articles: ✔
  • References: ✔
  • Cited by: ✔
  • Links to full text: ✔
  • Export formats: APA, MLA, Chicago, Harvard, Vancouver, RIS, BibTeX

Search interface of Google Scholar

BASE is hosted at Bielefeld University in Germany. That is also where its name stems from (Bielefeld Academic Search Engine).

  • Coverage: approx. 136 million articles (contains duplicates)
  • Abstracts: ✔
  • Related articles: ✘
  • References: ✘
  • Cited by: ✘
  • Export formats: RIS, BibTeX

Search interface of Bielefeld Academic Search Engine aka BASE

CORE is an academic search engine dedicated to open-access research papers. For each search result, a link to the full-text PDF or full-text web page is provided.

  • Coverage: approx. 136 million articles
  • Links to full text: ✔ (all articles in CORE are open access)
  • Export formats: BibTeX

Search interface of the CORE academic search engine

Science.gov is a fantastic resource as it bundles and offers free access to search results from more than 15 U.S. federal agencies. There is no need anymore to query all those resources separately!

  • Coverage: approx. 200 million articles and reports
  • Links to full text: ✔ (available for some databases)
  • Export formats: APA, MLA, RIS, BibTeX (available for some databases)

Search interface of Science.gov

Semantic Scholar is the new kid on the block. Its mission is to provide more relevant and impactful search results using AI-powered algorithms that find hidden connections and links between research topics.

  • Coverage: approx. 40 million articles
  • Export formats: APA, MLA, Chicago, BibTeX

Search interface of Semantic Scholar

Although Baidu Scholar's interface is in Chinese, its index contains research papers in English as well as Chinese.

  • Coverage: no detailed statistics available, approx. 100 million articles
  • Abstracts: only snippets of the abstract are available
  • Export formats: APA, MLA, RIS, BibTeX

Search interface of Baidu Scholar

RefSeek searches more than one billion documents from academic and organizational websites. Its clean interface makes it especially easy to use for students and new researchers.

  • Coverage: no detailed statistics available, approx. 1 billion documents
  • Abstracts: only snippets of the article are available
  • Export formats: not available

Search interface of RefSeek

Consider using a reference manager like Paperpile to save, organize, and cite your references. Paperpile integrates with Google Scholar and many popular databases, so you can save references and PDFs directly to your library using the Paperpile buttons:

how to access research papers for free

Google Scholar is an academic search engine, and it is the clear number one when it comes to academic search engines. It's the power of Google searches applied to research papers and patents. It not only let's you find research papers for all academic disciplines for free, but also often provides links to full text PDF file.

Semantic Scholar is a free, AI-powered research tool for scientific literature developed at the Allen Institute for AI. Sematic Scholar was publicly released in 2015 and uses advances in natural language processing to provide summaries for scholarly papers.

BASE , as its name suggest is an academic search engine. It is hosted at Bielefeld University in Germany and that's where it name stems from (Bielefeld Academic Search Engine).

CORE is an academic search engine dedicated to open access research papers. For each search result a link to the full text PDF or full text web page is provided.

Science.gov is a fantastic resource as it bundles and offers free access to search results from more than 15 U.S. federal agencies. There is no need any more to query all those resources separately!

how to access research papers for free

Open Access. Powered by Scholars. Published by Universities. ®

Digital Commons Network

Digital Commons Network ™

Static Sunburst

The Digital Commons Network brings together free, full-text scholarly articles from hundreds of universities and colleges worldwide. Curated by university librarians and their supporting institutions, the Network includes a growing collection of peer-reviewed journal articles, book chapters, dissertations, working papers, conference proceedings, and other original scholarly work.

arXiv's Accessibility Forum starts next month!

Help | Advanced Search

arXiv is a free distribution service and an open-access archive for nearly 2.4 million scholarly articles in the fields of physics, mathematics, computer science, quantitative biology, quantitative finance, statistics, electrical engineering and systems science, and economics. Materials on this site are not peer-reviewed by arXiv.

arXiv is a free distribution service and an open-access archive for scholarly articles in the fields of physics, mathematics, computer science, quantitative biology, quantitative finance, statistics, electrical engineering and systems science, and economics. Materials on this site are not peer-reviewed by arXiv.

The arXiv Accessibility Forum

arXiv Accessibility Forum

Accessibility means access regardless of disability. Join arXiv and global experts this September at the Forum focused on accessibility of scientific research. Learn more .

  • Astrophysics ( astro-ph new , recent , search ) Astrophysics of Galaxies ; Cosmology and Nongalactic Astrophysics ; Earth and Planetary Astrophysics ; High Energy Astrophysical Phenomena ; Instrumentation and Methods for Astrophysics ; Solar and Stellar Astrophysics
  • Condensed Matter ( cond-mat new , recent , search ) Disordered Systems and Neural Networks ; Materials Science ; Mesoscale and Nanoscale Physics ; Other Condensed Matter ; Quantum Gases ; Soft Condensed Matter ; Statistical Mechanics ; Strongly Correlated Electrons ; Superconductivity
  • General Relativity and Quantum Cosmology ( gr-qc new , recent , search )
  • High Energy Physics - Experiment ( hep-ex new , recent , search )
  • High Energy Physics - Lattice ( hep-lat new , recent , search )
  • High Energy Physics - Phenomenology ( hep-ph new , recent , search )
  • High Energy Physics - Theory ( hep-th new , recent , search )
  • Mathematical Physics ( math-ph new , recent , search )
  • Nonlinear Sciences ( nlin new , recent , search ) includes: Adaptation and Self-Organizing Systems ; Cellular Automata and Lattice Gases ; Chaotic Dynamics ; Exactly Solvable and Integrable Systems ; Pattern Formation and Solitons
  • Nuclear Experiment ( nucl-ex new , recent , search )
  • Nuclear Theory ( nucl-th new , recent , search )
  • Physics ( physics new , recent , search ) includes: Accelerator Physics ; Applied Physics ; Atmospheric and Oceanic Physics ; Atomic and Molecular Clusters ; Atomic Physics ; Biological Physics ; Chemical Physics ; Classical Physics ; Computational Physics ; Data Analysis, Statistics and Probability ; Fluid Dynamics ; General Physics ; Geophysics ; History and Philosophy of Physics ; Instrumentation and Detectors ; Medical Physics ; Optics ; Physics and Society ; Physics Education ; Plasma Physics ; Popular Physics ; Space Physics
  • Quantum Physics ( quant-ph new , recent , search )

Mathematics

  • Mathematics ( math new , recent , search ) includes: (see detailed description ): Algebraic Geometry ; Algebraic Topology ; Analysis of PDEs ; Category Theory ; Classical Analysis and ODEs ; Combinatorics ; Commutative Algebra ; Complex Variables ; Differential Geometry ; Dynamical Systems ; Functional Analysis ; General Mathematics ; General Topology ; Geometric Topology ; Group Theory ; History and Overview ; Information Theory ; K-Theory and Homology ; Logic ; Mathematical Physics ; Metric Geometry ; Number Theory ; Numerical Analysis ; Operator Algebras ; Optimization and Control ; Probability ; Quantum Algebra ; Representation Theory ; Rings and Algebras ; Spectral Theory ; Statistics Theory ; Symplectic Geometry

Computer Science

  • Computing Research Repository ( CoRR new , recent , search ) includes: (see detailed description ): Artificial Intelligence ; Computation and Language ; Computational Complexity ; Computational Engineering, Finance, and Science ; Computational Geometry ; Computer Science and Game Theory ; Computer Vision and Pattern Recognition ; Computers and Society ; Cryptography and Security ; Data Structures and Algorithms ; Databases ; Digital Libraries ; Discrete Mathematics ; Distributed, Parallel, and Cluster Computing ; Emerging Technologies ; Formal Languages and Automata Theory ; General Literature ; Graphics ; Hardware Architecture ; Human-Computer Interaction ; Information Retrieval ; Information Theory ; Logic in Computer Science ; Machine Learning ; Mathematical Software ; Multiagent Systems ; Multimedia ; Networking and Internet Architecture ; Neural and Evolutionary Computing ; Numerical Analysis ; Operating Systems ; Other Computer Science ; Performance ; Programming Languages ; Robotics ; Social and Information Networks ; Software Engineering ; Sound ; Symbolic Computation ; Systems and Control

Quantitative Biology

  • Quantitative Biology ( q-bio new , recent , search ) includes: (see detailed description ): Biomolecules ; Cell Behavior ; Genomics ; Molecular Networks ; Neurons and Cognition ; Other Quantitative Biology ; Populations and Evolution ; Quantitative Methods ; Subcellular Processes ; Tissues and Organs

Quantitative Finance

  • Quantitative Finance ( q-fin new , recent , search ) includes: (see detailed description ): Computational Finance ; Economics ; General Finance ; Mathematical Finance ; Portfolio Management ; Pricing of Securities ; Risk Management ; Statistical Finance ; Trading and Market Microstructure
  • Statistics ( stat new , recent , search ) includes: (see detailed description ): Applications ; Computation ; Machine Learning ; Methodology ; Other Statistics ; Statistics Theory

Electrical Engineering and Systems Science

  • Electrical Engineering and Systems Science ( eess new , recent , search ) includes: (see detailed description ): Audio and Speech Processing ; Image and Video Processing ; Signal Processing ; Systems and Control
  • Economics ( econ new , recent , search ) includes: (see detailed description ): Econometrics ; General Economics ; Theoretical Economics

About arXiv

  • General information
  • How to Submit to arXiv
  • Membership & Giving
  • Advanced search
  • Peer review

how to access research papers for free

Discover relevant research today

how to access research papers for free

Advance your research field in the open

how to access research papers for free

Reach new audiences and maximize your readership

ScienceOpen puts your research in the context of

Publications

For Publishers

ScienceOpen offers content hosting, context building and marketing services for publishers. See our tailored offerings

  • For academic publishers  to promote journals and interdisciplinary collections
  • For open access journals  to host journal content in an interactive environment
  • For university library publishing  to develop new open access paradigms for their scholars
  • For scholarly societies  to promote content with interactive features

For Institutions

ScienceOpen offers state-of-the-art technology and a range of solutions and services

  • For faculties and research groups  to promote and share your work
  • For research institutes  to build up your own branding for OA publications
  • For funders  to develop new open access publishing paradigms
  • For university libraries to create an independent OA publishing environment

For Researchers

Make an impact and build your research profile in the open with ScienceOpen

  • Search and discover relevant research in over 95 million Open Access articles and article records
  • Share your expertise and get credit by publicly reviewing any article
  • Publish your poster or preprint and track usage and impact with article- and author-level metrics
  • Create a topical Collection  to advance your research field

Create a Journal powered by ScienceOpen

Launching a new open access journal or an open access press? ScienceOpen now provides full end-to-end open access publishing solutions – embedded within our smart interactive discovery environment. A modular approach allows open access publishers to pick and choose among a range of services and design the platform that fits their goals and budget.

Continue reading “Create a Journal powered by ScienceOpen”   

What can a Researcher do on ScienceOpen?

ScienceOpen provides researchers with a wide range of tools to support their research – all for free. Here is a short checklist to make sure you are getting the most of the technological infrastructure and content that we have to offer. What can a researcher do on ScienceOpen? Continue reading “What can a Researcher do on ScienceOpen?”   

ScienceOpen on the Road

Upcoming events.

  • 15 June – Scheduled Server Maintenance, 13:00 – 01:00 CEST

Past Events

  • 20 – 22 February – ResearcherToReader Conference
  • 09 November – Webinar for the Discoverability of African Research
  • 26 – 27 October – Attending the Workshop on Open Citations and Open Scholarly Metadata
  • 18 – 22 October – ScienceOpen at Frankfurt Book Fair.
  • 27 – 29 September – Attending OA Tage, Berlin .
  • 25 – 27 September – ScienceOpen at Open Science Fair
  • 19 – 21 September – OASPA 2023 Annual Conference .
  • 22 – 24 May – ScienceOpen sponsoring Pint of Science, Berlin.
  • 16-17 May – ScienceOpen at 3rd AEUP Conference.
  • 20 – 21 April – ScienceOpen attending Scaling Small: Community-Owned Futures for Open Access Books .

What is ScienceOpen?

  • Smart search and discovery within an interactive interface
  • Researcher promotion and ORCID integration
  • Open evaluation with article reviews and Collections
  • Business model based on providing services to publishers

Live Twitter stream

Some of our partners:.

Akadémiai Kiadó

  • Open Access Button

For Libraries

The Open Access Button is now built by OA.Works . Same people, new name! Read more about our rebrand.

The Open Data Button has now merged with the Open Access Button. Your account and request will stay the same, but you'll need to get the new plugin. For more on the changes see our blog .

Thanks for your support! Team Button has now merged with the Open Access Button and our Request system.

Your Account

how to access research papers for free

Avoid Paywalls, Request Research.

Free, legal research articles delivered instantly or automatically requested from authors..

Searching thousands of repositories for access !

Give us a moment.

Get around this paywall in a flash: DOI: 10.1126/science.196.4287.293 URL: http://science.sciencemag.org/content/196/4287/293/tab-pdf PMC (Pubmed Central) ID: PMC4167664 Pubmed ID: 17756097 Title: Ribulose bisphosphate carboxylase: a two-layered, square-shaped molecule of symmetry 422 Citation: Baker, T. S., Eisenberg, D., & Eiserling, F. (1977). Ribulose Bisphosphate Carboxylase: A Two-Layered, Square-Shaped Molecule of Symmetry 422. Science, 196(4287), 293-295. doi:10.1126/science.196.4287.293 or try your favourite citation format (Harvard, Bibtex, etc).

Check out some of our latest requests .

Finding Available Research

Give us a scholarly paper and we’ll search thousands of sources with millions of articles to link you to free, legal, full text articles instantly.

Requesting Research

If we can’t get you access, we’ll start a request for you. We request articles from authors, and guide them on making the work available to you and everyone who needs it.

You can do this from our website, browser extensions, tools for libraries or our API . Take your pick or learn more.

Proudly non-profit • Open source • Library-aligned

Built by OA.Works

Proudly non-profit · open source · library-aligned

About · Requests · API · Bugs · Twitter · Account Login · Status

Libraries | Research Guides

Open access and free scholarly resources.

  • Social Sciences
  • Primary Sources
  • Dissertations
  • Cambridge University Press Open Access Open access journals from Cambridge University Press.
  • Digital Commons Network The Digital Commons Network brings together free, full-text scholarly articles from hundreds of universities and colleges worldwide. Curated by university librarians and their supporting institutions, the Network includes a growing collection of peer-reviewed journal articles, book chapters, dissertations, working papers, conference proceedings, and other original scholarly work.
  • Directory of Open Access Journals DOAJ is an online directory that indexes and provides access to quality open access, peer-reviewed journals.
  • JSTOR: Open Access Journals Growing collection of Open Access journals cover topical areas in sustainability and security studies, and offer broad coverage in the humanities, social sciences, and sciences.
  • LOADB: Listing of Open Access Databases The objective of Listing of Open Access DataBases (LOADB) is to create a web-enabled, linked, classified and categorized collection of Open Access Databases which one can access from a single portal. Although initial focus is on science and technology subjects, the ultimate aim is to include all subject areas.
  • Open Library of Humanities Open Library of Humanities journal publishes internationally-leading, rigorous and peer-reviewed scholarship across the humanities disciplines: from classics, theology and philosophy, to modern languages and literatures, film and media studies, anthropology, political theory and sociology.
  • Project Muse Open Access Journals Open Access journal content from Project Muse.
  • Sage Open Access Open access journals published by SAGE. All articles published in the journals provide worldwide, barrier-free access to the full-text of articles online, immediately on publication under a creative commons license.
  • SciELO Scholarly literature in sciences, social sciences, arts & humanities published in open access journals from Latin American, Portugal, Spain and South Africa
  • SpringerOpen: Journals Includes Springer’s portfolio of 160+ peer-reviewed fully open access journals across all areas of science.
  • Directory of Open Access Books A directory of academic, peer reviewed open access books.
  • Hathi Trust Digital Library This link opens in a new window A partnership of more than sixty major research institutions with Google, the Hathi Trust Digital Library includes all the book images from these libraries that have been digitized by Google. Only out-of-copyright images (generally pre-1923) can be displayed, or others where the permission of the copyright holder has been obtained, though both in-copyright and out-of-copyright materials can be searched. Out-of-copyright books can be downloaded by Northwestern users who register with the site.
  • Internet Archive: eBooks and Texts The Internet Archive and Open Library offers over 8,000,000 fully accessible public domain eBooks. This includes a special modern collection of over 500,000 eBooks for users with print disabilities, and a very interesting curated, modern collection for the world at large.
  • JSTOR: Open Access Books 7,000+ Open Access ebooks from 90 publishers, including Brill, Cornell University Press, De Gruyter, and University of California Press, are now available at no cost to libraries or users.
  • Luminos Luminos is University of California Press’s Open Access publishing program for monographs. With the same high standards for selection, peer review, production and marketing as our traditional program, Luminos is a transformative model, built as a partnership where costs and benefits are shared.
  • MIT Open Access Books Open access titles from MIT
  • Open Book Publishers Open books in humanities and social sciences.
  • Open Textbook Library Open textbooks are textbooks that have been funded, published, and licensed to be freely used, adapted, and distributed. These books have been reviewed by faculty from a variety of colleges and universities to assess their quality. These books can be downloaded for no cost, or printed at low cost. All textbooks are either used at multiple higher education institutions; or affiliated with an institution, scholarly society, or professional organization.
  • OAPEN: Open Access Publishing in European Networks The OAPEN Library contains freely accessible academic books, mainly in the area of humanities and social sciences. OAPEN works with publishers to build a quality controlled collection of open access books, and provides services for publishers, libraries and research funders in the areas of deposit, quality assurance, dissemination, and digital preservation.
  • Project Gutenberg Project Gutenberg offers over 50,000 free ebooks: choose among free epub books, free kindle books, download them or read them online.
  • Project Muse Open Access Books Open Access books from Project Muse
  • TOME The Association of American Universities, Association of Research Libraries, and Association of University Presses have launched an initiative to increase access to humanities and social sciences scholarship.
  • University of Michigan Press Open Access Open access books available through the University of Michigan Press.
  • WorldCat.org WorldCat.org lets you search the collections of libraries in your community and thousands more around the world. more... less... You can search for popular books, music CDs and videos—all of the physical items you're used to getting from libraries. You can also discover many new kinds of digital content, such as downloadable audiobooks. You may also find article citations with links to their full text; authoritative research materials, such as documents and photos of local or historic significance; and digital versions of rare items that aren't available to the public. Because WorldCat libraries serve diverse communities in dozens of countries, resources are available in many languages.
  • Next: Humanities >>
  • Last Updated: Jul 2, 2024 9:26 AM
  • URL: https://libguides.northwestern.edu/freescholarlyresources

FSTA Logo

Start your free trial

Arrange a trial for your organisation and discover why FSTA is the leading database for reliable research on the sciences of food and health.

REQUEST A FREE TRIAL

  • Research Skills Blog

5 free and legal ways to get the full text of research articles

By Carol Hollier on 07-Apr-2021 13:23:17

Accessing full text of research articles | IFIS Publishing

1.  Use your library if you have one !

If you are affiliated with a university, you probably have free library access to the full text of millions of research articles.   The library will have subscribed to these journals on your behalf. The smartest thing you can do for accessing research articles is familiarize yourself with your own library.

  • If you search a database your library will link from the records to the full text if they have it—all you need to do is click through the links.
  • When they do not have a copy of an article, a university library can get it for you from another library. This inter-library loan service is usually free to users.
  • Your library might use a browser extension like Lean Library or LibKey Nomad to link you to the library subscription or open access full text from wherever you are on the internet.
  • Google Scholar lets you configure your account to get links straight to your library’s subscription copy of an article.  But remember--side-by-side to library subscriptions for legitimate research, Google Scholar includes links to articles published in predatory and unreliable journals that would be unwise to credit in your own work.  Learn more about predatory journals.

If you are not affiliated with a university library, there are still ways you can successfully—and legally—get the full text of research articles.

2.  Open Access browser extensions  

More and more research is published Open Access as governments around the world are mandating that research paid for by taxpayer money be freely available to those taxpayers.

Browser extensions have been created to make it easy to spot when the full text of an article is free.   Some of the best are CORE Discovery , Unpaywall and Open Access Button .

Learn more about difference between discovery and access and why it matters for good research: Where to search - Best Practice for Literature Searching - LibGuides at IFIS

3. Google Scholar

You can search the article title inside quotation marks on Google Scholar to see if a link to a copy of the article appears.   If it does, be sure to pay attention to what version of the article you are linking to, to be sure you are getting what you think you’re getting.  These links can lead to an article's published version of record, a manuscript version, or to a thesis or conference proceeding with the same title and author as the article you expected to find.   

4.  Researcher platforms

 A Google Scholar search might lead you to a researcher platform like Academia.edu or ResearchGate .   There, if you set up an account, you can sometimes download or request a copy of the text.  Again, pay attention to which version of the text you get!

5.  Write to the author

If you can’t get a copy by other means, you can write to an article’s corresponding author and (politely!) ask them to send you a copy. Their contact information, usually an email address, will be listed in the information you find about the article, either in a database record for the article or on the publishing journal’s page for it. Many authors are happy to share a copy of their work.

Three bonus ways that might work depending on where you live:

1.  A nearby university library might offer access to articles even if you do not work or study there.

Members of the public are sometimes allowed access to university journal subscriptions through visitor access or a walk-in user service. You usually need to use the collections from a dedicated computer terminal located in a library and may need to make an appointment before you go. Do your research before showing up to make sure you bring the correct documents and equipment (like a flash drive) along.

2.  Try your public library

In some countries, public libraries partner with publishers to give the public access to research articles.   In the UK, for instance, many public libraries participate in the Access to Research scheme, which gives members of the public on-site access to over 30 million academic articles. Contact your local public library to learn what is available to you.

3.  Research4Life

In other countries, your institution might have access to a massive collection of research articles and databases through the publisher/library/United Nations agency initiative Research4Life . Check to see if you already have access, and if not, if your institution might be eligible to join. Membership is only available on an organizational or institutional level.  

Remember —even though you now have a lot of strategies for finding the full text of articles, research should never be led by the articles you can access most easily.

Good research is driven by first figuring out what articles are most relevant to your question and then getting the full text of what you need. One of the best ways to do this is to use a good discipline-specific database, like FSTA for the sciences of food and health.  

Learn more about difference between discovery and access and why it matters for good research:

Where to search - Best Practice for Literature Searching

Photo by Patrick Tomasso on Unsplash

BLOG CTA

  • FSTA - Food Science & Technology Abstracts
  • IFIS Collections
  • Resources Hub
  • Diversity Statement
  • Sustainability Commitment
  • Company news
  • Frequently Asked Questions
  • Privacy Policy
  • Terms of Use for IFIS Collections

Ground Floor, 115 Wharfedale Road,  Winnersh Triangle, Wokingham, Berkshire RG41 5RB

Get in touch with IFIS

© International Food Information Service (IFIS Publishing) operating as IFIS – All Rights Reserved     |     Charity Reg. No. 1068176     |     Limited Company No. 3507902     |     Designed by Blend

how to access research papers for free

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

  • We're Hiring!
  • Help Center

Download 55 million PDFs for free

Explore our top research interests.

how to access research papers for free

Engineering

how to access research papers for free

Anthropology

how to access research papers for free

  • Earth Sciences

how to access research papers for free

  • Computer Science

how to access research papers for free

  • Mathematics

how to access research papers for free

  • Health Sciences

how to access research papers for free

Join 269 million academics and researchers

Track your impact.

Share your work with other academics, grow your audience and track your impact on your field with our robust analytics

Discover new research

Get access to millions of research papers and stay informed with the important topics around the world

Publish your work

Publish your research with fast and rigorous service through Academia.edu Journals. Get instant worldwide dissemination of your work

Unlock the most powerful tools with Academia Premium

how to access research papers for free

Work faster and smarter with advanced research discovery tools

Search the full text and citations of our millions of papers. Download groups of related papers to jumpstart your research. Save time with detailed summaries and search alerts.

  • Advanced Search
  • PDF Packages of 37 papers
  • Summaries and Search Alerts

how to access research papers for free

Share your work, track your impact, and grow your audience

Get notified when other academics mention you or cite your papers. Track your impact with in-depth analytics and network with members of your field.

  • Mentions and Citations Tracking
  • Advanced Analytics
  • Publishing Tools

Real stories from real people

how to access research papers for free

Used by academics at over 15,000 universities

how to access research papers for free

Get started and find the best quality research

  • Academia.edu Journals
  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Cognitive Science
  • Academia ©2024
  • Main website
  • Rationalwiki / Oliver Smith
  • Donation options
  • In the media
  • Relation to Søren Kierkegaard?

How to use Sci-hub to get academic papers for free

  • Post author: Emil O. W. Kirkegaard
  • Post published: 10. April 2018
  • Post category: Science

I regularly tell people on Twitter to use Sci-hub when they say they can’t access papers:

Yes you can, use Sci hub like normal people do. — Emil O W Kirkegaard (@KirkegaardEmil) April 10, 2018

However, it seems that people don’t really know how to use Sci-hub. So here is a simple, visual guide.

1. Go to the Sci-hub website

The URL may change to the website because the lobbyists of Big Publish (Elsevier, SAGE etc.) constantly try to get government to censor the website as it cuts into their rent-seeking profits . You can find the latest URLs via this handy website called Where is Sci-Hub now? (alternatively, via Wikipedia ). Currently, some working URLs are:

  • https://sci.hubg.org/
  • https://sci-hub.yncjkj.com (global)
  • https://sci-hub.mksa.top/ (global)
  • https://sci-hub.it.nf/
  • https://sci-hub.st/ ( São Tomé and Príncipe )
  • https://sci-hub.do (Dominican Republic)
  • https://sci-hub.se/ (Sweden)
  • https://sci-hub.shop (global) [redirects]
  • https://scihub.bban.top (global) [redirects]
  • https://scihub.wikicn.top/ (global) [redirects]
  • https://sci-hub.pl/ (Poland)
  • https://sci-hub.tw (Taiwan)
  • https://sci-hub.si (Slovenia)
  • https://mg.scihub.ltd/ (global)

If your country blocks the website, use one of the many free general purpose proxies. I tested hide.me for the purpose of writing this article and it works fine for Sci-hub using the Netherlands exit.

2. Go to the journal publisher’s website

Go to the website of whatever article it is you are trying to get. Here we pretend you want the article in my tweet above:

  • Seeber, M., Cattaneo, M., Meoli, M., & Malighetti, P. (2017). Self-citations as strategic response to the use of metrics for career decisions . Research Policy.

The website for this is sciencedirect.com which is Elsevier’s cover name. Then, you locate either the URL for this (i.e. https://www.sciencedirect.com/science/article/pii/S004873331730210X) or the article’s DOI. The DOI is that unique document identifier that begins with “10.”. It is almost always shown somewhere on the site, so you can use search “10.” to find it. In rare cases, it is in the page’s source code or may not exist. If it doesn’t exist, it means you usually can’t get the article thru Sci-hub. When you have the article’s URL/DOI, you simply paste this into the Sci-hub search box. Like this:

how to access research papers for free

Then you click “open” and you should get something like this:

how to access research papers for free

In some cases, this may not work. The APA journals seem to cause issues using the URL approach, so use the DOI approach. Sometimes Sci-hub returns the wrong article (<1% I should guess).

Finding articles from APA journals

These journals refuse to give a DOI and they don’t work with URL either usually. Example this paper . A workaround is to search Crossref for the title which gives the DOI, then use the DOI to fetch the paper as usual:

how to access research papers for free

You Might Also Like

Women in prisons in percent, can ipcc predict the future testing the 1990 predictions, some ideas about open and decentralized science.

Panda

access millions of research papers with Paper Panda

So easy to use, such a huge life saver in terms of research and assessments !! have not come across a article i can not, not read thanks to this :D so happy and has made life easier, thank you, thank you, thank you

Kenu Taiepa

One of the most useful web extensions I have ever used, Thank you to the girl on Tiktok that recommended it. I hope both sides of her pillow are cold everyday. Thank you to the developers as well. Huge thumbs up.

Ore Kayode

es muy bueno!!!! y muy útil!!! estoy literalmente llorando de la felicidad porque ahora puedo ver ensayos o artículos que antes necesitaba y no podía, y además es muy fácil de usar muy recomendado

Louis Smiles

It is soooooo amazing ,easy to use and it works like a charm. Helped me a great deal!! Thank you so much
Works great. Been using it only for a short while, but it didn’t fail yet. It’s also very quick. Downside is that it sometimes downloaded an early version of the paper, not the final published paper.
very helpful in searching scientific articles

Jamailah Rose Biagcong

way far out from my excecptation, seldom giving comment but i have to shout out for this one !! Super great!!!!!

H K

Why didn't i know this existed years ago this is the best tool for a scholar ever thank you!!!!!!!!!!

Diela Albert

Cela me change la vie. C'est juste incroyable de pouvoir accéder à la connaissance sans aucune barrière. L'outil est bluffant, rapide et sûr.

Maria Mercanti-Guérin

An amazing extension for a researcher.

Dr. Devika Rani

Makes my research a whole ton easier

Ms Aqilah

I wish I found this earlier. It works perfectly, easy to access any articles
Game Changer for my thesis, thanks so much!

Thomas Hauer

Insanely useful, and it is probably one of the greatest things in 2021.

Moomin

Muy recomendable. Útil y fácil de usar.

Mayra Melo

muy fácil de usar

Karl Gutierrez H.

Loving this!!

วันวันของว่าน ก็งี้แหละ

Fácil de usar y útil para estudiantes

Johana Sotelo

Ứng dụng tuyệt vời cho nghiên cứu khoa học

Võ Hồng Quý

Great app useful for my research

Kasthuri Kumar

Thank you so much for making my life easier!!!!!!!!!

Yarolyne Sakase

A melhor extensão!

Eduardo Pavarino

“Paywall? What’s that?”

Paperpanda searches the web for pdf s so you don’t have to, i’m here to help, you’ve probably run into this problem – you want to read a paper, but it’s locked behind a paywall. maybe you have access to it through your library or university, maybe it’s available to download for free through an open access portal, maybe the author uploaded a pdf to a website somewhere – but how are you going to find it paperpanda is here to help just click the tiny panda in your toolbar and the panda will run off and find the paper for you., access research papers in one click, save time accessing full-text pdf s with the free paperpanda browser plugin, stop clicking and start reading, stop navigating paywalls, search engines, and logins. paperpanda helps you get that full-text pdf faster.

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

electronics-logo

Article Menu

how to access research papers for free

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Review of smart-home security using the internet of things, 1. introduction.

  • User awareness level: Users are always considered one of the weak links on the cyber risk chain, and usually, home users are not aware of the cyber threats related to smart-home devices, or may not know how to properly secure them. This can lead to weak passwords, false configurations, failure to update software, and other security vulnerabilities.
  • Complexity: Smart homes can be complex systems with many devices, sensors, and services. This complexity can make it difficult to manage security and identify vulnerabilities.
  • Interoperability and Heterogeneity: Smart-home devices are often developed by different manufacturers and use different communication protocols, which makes it difficult to ensure that they can all work together securely.
  • Remote access: Smart-home devices often allow for remote access via Internet connection, which increases the risk of unauthorized access by attackers. This is especially concerning as many users may not secure their remote access properly.
  • Limited resources: Smart-home devices often operate with limited resources, such as low power consumption, limited memory, and processing power. This makes it challenging to implement strong security protocols.
  • Lack of regulation: There are currently no standardized security regulations for smart-home devices, which means that security measures can vary widely between different devices and manufacturers.

2. Related Works

3. smart-home ecosystem, 3.1. iot in smart homes, 3.2. infotainment devices, 3.3. physical home security and monitoring, 3.4. ambient living devices, 3.5. other aspects and actuators, 4. analysis and discussions of the iot setting, 4.1. architectural structure of iot ecosystems.

  • International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC): The ISO and IEC have developed several standards related to IoT, including ISO/IEC 30141 [ 93 ] which provides guidelines for the architecture and interoperability of IoT systems. While the ISO/IEC standards may not explicitly define the layers of an IoT architecture, they offer principles and recommendations for designing scalable and interoperable IoT solutions.
  • Institute of Electrical and Electronics Engineers (IEEE): The IEEE has published numerous standards and guidelines for IoT, including IEEE P2413 [ 94 ] which defines an architectural framework for IoT. While IEEE P2413 does not prescribe specific layers, it outlines key architectural concepts and considerations for IoT systems.
  • Industrial Internet Consortium (IIC): The IIC has developed the Industrial Internet Reference Architecture (IIRA) [ 95 ], which provides a comprehensive framework for designing industrial IoT solutions. While focused on industrial applications, the IIRA can be adapted for other IoT use-cases and includes concepts related to layered architectures.
  • Open Connectivity Foundation (OCF): The OCF has developed standards for interoperability and connectivity in IoT devices and ecosystems [ 96 ]. While the OCF standards primarily focus on interoperability protocols, they also address architectural principles that may align with layered approaches.
  • National Institute of Standards and Technology (NIST): The NIST has published several documents related to IoT security and architecture, including the NIST Cybersecurity Framework [ 97 ] and NIST Special Publication 800-183 [ 98 ], which provide guidance on IoT device cybersecurity. While not explicitly defining layers, these documents offer principles and recommendations for designing secure IoT architectures.
  • Application: smart environment, smart home, smart city;
  • Perception: movement sensors, smoke sensors, pressure sensors;
  • Network: nodes, servers, topologies;
  • Physical: smart phones, smart appliances, power supplies.

4.2. Threats Faced by a Smart Home and Related Countermeasures

4.2.1. application layer analysis, 4.2.2. perception layer analysis, 4.2.3. network layer analysis, 4.2.4. physical layer analysis, 4.2.5. summary of threats and countermeasures, 5. best-practices guide for a secure smart home.

  • Identify Needs: Determine what you want your smart-home devices to accomplish. This could range from enhancing security to improve energy-efficiency or simply adding convenience to your daily routines.
  • Select Compatible Devices: Choose devices that are compatible with each other and can be easily integrated into a single ecosystem. Look for devices that support common standards or platforms (e.g., Apple HomeKit, Google Home, Amazon Alexa).
  • Update/Upgrade Regularly: Set a process to automatically or periodically seek for and install updates/upgrades. Both for firmware and application software.
  • Disposal Policy: Set safe disposal strategies for all equipment, including secure deletion/destruction of data and even physical destruction of digital components and memories/storage.
  • Device’s Security Controls: Set all potential defenses that are provided by the main manufacturer (e.g., pins, extra security code, networking safeguards, etc.).
  • Minimize Exposure: Restrict connectivity to the least open/public LANs and networks that are necessary. Minimize the exposure of the system.
  • Set User Privileges: Restrict the number of authorized users to the minimum required. For each user, restrict access rights to the least privileges required.
  • Security Software: Set anti-virus, anti-malware, host-firewall, and host-IDS where applicable.
  • Delete Unnecessary Elements: Remove services, applications, or other elements that are insecure or not in use by the current system (e.g., Telnet).
  • Avoid Outdated Equipment: Do not use outdated devices that are not supported by the vendor anymore.
  • Configure Before Deployment: Before incorporating a new device to your system, verify that it is updated/upgraded, and all security and configurations are properly set.
  • Use Only Secure Versions: Install the latest secure and stable versions.
  • Set And Update Before Use: Upon installation, proceed immediately with the proper updates/upgrades, configurations, and settings of security/privacy.
  • Automate Updates: Set automated or periodic updates/upgrades.
  • Strong Authentication: Use strong passwords, as well as multi-factor authentication, wherever possible.
  • Application-Level Protections: Enable application-level firewalls, IDS, extra pins, or other defenses, wherever possible.
  • Restrict Access: Restrict access rights/permissions and connectivity to the minimum required.
  • Restrict Users: If applicable, restrict the number of users to the minimum required.
  • Especially for the technicians/engineers, always check the validity of the elements that are about to be installed (e.g., check the digital certification of the website, as well as the digest of the downloaded software).
  • For elements of unknown or less popular vendors, also check for recommendations from other users in related forums.
  • Do not install less trusted applications/software in the core of the system, especially if you have not tested them in a less critical part of your setting.
  • Monitor Operation: Where applicable, install security software for monitoring of the runtime environment and alerting.
  • Set Build-In Security and Privacy Controls: Check the offered options and set the privacy policies to the minimum required.
  • Secure Deletion: Apply secure removal strategies, logging out from all accounts and applications, revoking all acquired accesses/permissions, and securely erasing all permanent and temporary data.
  • Respond to Incidents: Set a response strategy, including details of whom you have to call and your first actions in case you notice something strange. For example, if you start receiving unknown notifications of purchase attempts in your mobile banking, you block your cards immediately and call your bank’s 24/7 security service.
  • Recover from Incidents: Set a recovery strategy in case something happens.
  • Security Configuration: Set the highest possible protections and set as a high priority the protection of the equipment that facilitates networking, especially for the devices that have direct access/exposure to Internet, and especially the main router.
  • Security Primitives: Activate or set additional firewalls and IDS/IPS. Use the most restrict policies possible.
  • Usage Zones: Create different LANs and virtual LANs (VLANs) for different usage zones of the smart home.
  • Remote Access: Consider setting an in-house virtual private network (VPN) for accessing the smart home remotely (e.g., the surveillance system).
  • Least Privileges: Restrict the privileges of services that are exposed to the Internet.
  • Network Monitoring: Install monitoring systems and periodically audit the activity of your system.
  • Decrease Attack Surface: Disable insecure communication protocols and services (e.g., http), as well as elements that are not currently in use.
  • Regular Updates: Similar with the devices, do not use outdated equipment.
  • Strong Passwords: Use strong, unique passwords for your Wi-Fi network and each of your smart-home devices.
  • Network Segmentation: Consider creating a separate Wi-Fi network for your smart devices to isolate them from the network you use for personal computing, reducing the risk of cross-device hacking.
  • Regular Updates: Keep your router’s firmware and your smart devices’ software up to date to protect against known vulnerabilities.
  • Follow Installation Guides: Carefully read and follow the installation instructions provided with your devices. This may include downloading an application, connecting to Wi-Fi, or performing initial setup steps.
  • Optimal Placement: Place devices in locations where they can function effectively (e.g., smart cameras with a clear field of view, smart thermostats away from direct sunlight).
  • Choose a Central Control System: Select a central hub or application that can control all your devices. This unifies control and makes managing your devices more convenient.
  • Customize Settings: Adjust settings for each device according to your preferences. This may involve setting schedules, creating automation rules, or defining scenes.
  • Test Operations: After setting up, test your devices individually and the system as a whole to ensure they work as expected.
  • Troubleshoot Issues: If a device is not working correctly, consult the troubleshooting section of the device manual or contact customer support.
  • User Training: Educate all household members on how to use the smart devices, emphasizing the importance of security practices, like not sharing passwords.
  • Manage Your Passwords and Accounts: Consider utilizing password/account managers.
  • Backup Your Data: Set a backup strategy.
  • Regular Reviews: Regularly review your smart-home setup to ensure it continues to meet your needs. Adjust settings, add new devices, or remove unnecessary ones as needed.

6. Directions for Future Research

  • Enhanced Biometric Security: Developing more sophisticated biometric authentication methods that leverage the unique capabilities of smart-home devices.
  • Context-Aware Security Protocols: Creating security protocols that adapt to the user’s context and environment within the smart home.
  • Decentralized Security Mechanisms: Exploring blockchain and other decentralized technologies for managing identity verification and ensuring data integrity.
  • Privacy-Enhancing Techniques: Developing methods for protecting personal data captured by smart-home devices, using advanced anonymization techniques and local data processing.
  • Secure Multi-User Interactions: Enhancing security for environments where multiple users interact with the same devices, like smart TV or AR/VR equipment.
  • Robust Malware Detection: Implementing sophisticated systems for detecting malware in IoT devices, including smart locks and cameras.
  • Physical and Network Security Integration: Investigating ways to integrate physical security measures with network security protocols across smart-home devices.
  • Energy-Efficient Security Protocols: Creating security solutions that minimize energy consumption, particularly for devices like smart locks and smart plugs.
  • Secure Device Management and Disposal: Ensuring secure lifecycle management of smart-home devices, from installation to disposal, to prevent data leaks.
  • International Security Standards for IoT: Developing and promoting the adoption of global security standards for IoT devices to ensure consistent security practices.
  • Anomaly Detection Using AI: Leveraging AI to detect and respond to unusual behavior or threats in smart-home environments.
  • IoT Device Interoperability and Security: Ensuring that all interconnected smart-home devices adhere to strict security protocols to prevent vulnerabilities.
  • Ethical Design and User Consent: Examining ethical issues in smart-home technology deployment, especially regarding surveillance and data-collection practices.
  • Forensic Capabilities for IoT Security: Developing forensic tools and techniques for investigating and mitigating security incidents in smart homes.
  • Consumer Awareness and Education: Enhancing user understanding of the potential risks and security practices associated with smart-home technologies.
  • Regulatory Compliance and Privacy Laws: Addressing compliance with existing and emerging privacy laws and regulations that affect smart-home technologies.
  • Advanced Encryption Methods: Researching more robust encryption techniques to secure data transmission between smart-home devices and external networks.
  • Hybrid Energy-Efficient Privacy Preserving Schemes: Developing privacy-preserving protocols that balance energy efficiency with effective privacy protection, especially in communication-heavy IoT environments, like smart homes.

7. Conclusions

Author contributions, data availability statement, acknowledgments, conflicts of interest.

  • Ndaguba, E.; Cilliers, J.; Ghosh, S.; Herath, S.; Mussi, E.T. Operability of Smart Spaces in Urban Environments: A Systematic Review on Enhancing Functionality and User Experience. Sensors 2023 , 23 , 6938. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Itair, M.; Shahrour, I.; Hijazi, I. The Use of the Smart Technology for Creating an Inclusive Urban Public Space. Smart Cities 2023 , 6 , 2484–2498. [ Google Scholar ] [ CrossRef ]
  • Rani, S.; Chauhan, M.; Kataria, A.; Khang, A. IoT equipped intelligent distributed framework for smart healthcare systems. In Towards the Integration of IoT, Cloud and Big Data ; Springer: Singapore, 2023; Volume 137, pp. 97–114. [ Google Scholar ]
  • Kapucu, N.; Bilim, M. Internet of Things for smart homes and smart cities. In Smart Grid 3.0 ; Springer: Cham, Germany, 2023; pp. 331–356. [ Google Scholar ]
  • Umair, M.; Cheema, M.A.; Afzal, B.; Shah, G. Energy management of smart homes over fog-based IoT architecture. Sustain. Comput. Inform. Syst. 2023 , 39 , 100898. [ Google Scholar ] [ CrossRef ]
  • Padmanaban, S.; Nasab, M.A.; Shiri, M.E.; Javadi, H.H.S.; Nasab, M.A.; Zand, M.; Samavat, T. The role of Internet of Things in smart homes. In Artificial Intelligence-Based Smart Power Systems ; Wiley: Hoboken, NJ, USA, 2022; Chapter 13. [ Google Scholar ]
  • Evans, D. The internet of things: How the next evolution of the internet is changing everything. Cisco Int. J. Internet 2011 , 3 , 123–132. [ Google Scholar ]
  • Fahrurozi, M.; Tarigan, S.A.; Alam Tanjung, M.; Mutijarsa, K. The Use of ISO/IEC 27005: 2018 for Strengthening Information Security Management (A Case Study at Data and Information Center of Ministry of Defence). In Proceedings of the 2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE), Yogyakarta, Indonesia, 6–8 October 2020. [ Google Scholar ]
  • Ahmed, F.; Ko, Y. Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks. Secur. Commun. Netw. 2016 , 9 , 5143–5154. [ Google Scholar ] [ CrossRef ]
  • Rawlinson, K. HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack ; HP Advisory: Singapore, 2014. [ Google Scholar ]
  • Akram, H.; Konstantas, D.; Mahyoub, M. A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model. Int. J. Adv. Comput. Sci. Appl. 2018 , 9 , 355–373. [ Google Scholar ] [ CrossRef ]
  • Ahemd, M.M.; Shah, M.A.; Wahid, A. IoT security: A layered approach for attacks & defenses. In Proceedings of the 2017 International Conference on Communication Technologies (ComTech), Rawalpindi, Pakistan, 19–21 April 2017; pp. 104–110. [ Google Scholar ]
  • Ahlawat, B.; Sangwan, A.; Sindhu, V. IoT system model challenges and threats. Int. J. Sci. Technol. Res. 2020 , 9 , 6771–6776. [ Google Scholar ]
  • Ali, W.; Dustgeer, G.; Awais, M.; Shah, M.A. IoT based smart home: Security challenges, security requirements and solutions. In Proceedings of the 2017 23rd International Conference on Automation and Computing (ICAC), Huddersfield, UK, 7–8 September 2017; pp. 1–6. [ Google Scholar ]
  • Gupta, B.B.; G Arachchilage, N.A.; Psannis, K.E. Defending against phishing attacks: Taxonomy of methods, current issues and future directions. Telecommun. Syst. 2018 , 67 , 247–267. [ Google Scholar ] [ CrossRef ]
  • Hatzivasilis, G.; Ioannidis, S.; Smyrlis, M.; Spanoudakis, G.; Frati, F.; Goeke, L.; Hildebrandt, T.; Tsakirakis, G.; Oikonomou, F.; Leftheriotis, G.; et al. Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees. Appl. Sci. 2020 , 10 , 5702. [ Google Scholar ] [ CrossRef ]
  • Smyrlis, M.; Somarakis, I.; Spanoudakis, G.; Hatzivasilis, G.; Ioannidis, S. CYRA: A Model-Driven Cyber Range Assurance Platform. Appl. Sci. 2021 , 11 , 5165. [ Google Scholar ] [ CrossRef ]
  • Zhu, P.; Hu, J.; Li, X.; Zhu, Q. Using Blockchain Technology to Enhance the Traceability of Original Achievements. IEEE Trans. Eng. Manag. 2023 , 70 , 1693–1707. [ Google Scholar ] [ CrossRef ]
  • Touqeer, H.; Zaman, S.; Amin, R.; Hussain, M.; Al-Turjman, F.; Bilal, M. Smart home security: Challenges, issues and solutions at different IoT layers. J. Supercomput. 2021 , 77 , 14053–14089. [ Google Scholar ] [ CrossRef ]
  • Almusaylim, Z.A.; Zaman, N. A review on smart home present state and challenges: Linked to context-awareness internet of things (IoT). Wirel. Netw. 2019 , 25 , 3193–3204. [ Google Scholar ] [ CrossRef ]
  • Bugeja, J.; Jacobsson, A.; Davidsson, P. On privacy and security challenges in smart connected homes. In Proceedings of the 2016 European Intelligence and Security Informatics Conference (EISIC), Uppsala, Sweden, 17–19 August 2016; pp. 172–175. [ Google Scholar ]
  • Gavra, V.D.; Dobra, I.M.; Pop, O.A. A survey on threats and security solutions for IoT. In Proceedings of the 2020 43rd International Spring Seminar on Electronics Technology (ISSE), Demanovska Valley, Slovakia, 14–15 May 2020; pp. 1–5. [ Google Scholar ]
  • Geneiatakis, D.; Kounelis, I.; Neisse, R.; Nai-Fovino, I.; Steri, G.; Baldini, G. Security and privacy issues for an IoT based smart home. In Proceedings of the 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 22–26 May 2017; pp. 1292–1297. [ Google Scholar ]
  • Kamrul, I.; Shen, W.; Wang, X. Security and privacy considerations for wireless sensor networks in smart home environments. In Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Wuhan, China, 23–25 May 2012; pp. 626–633. [ Google Scholar ]
  • Uand, J.; Sun, L. A Comprehensive Survey of Security Issues of Smart Home System: “Spear” and “Shields,” Theory and Practice. IEEE Access 2022 , 10 , 67–192. [ Google Scholar ]
  • Dahmen, J.; Cook, D.J.; Wang, X.; Honglei, W. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats. J. Reliab. Intell. Environ. 2017 , 3 , 83–98. [ Google Scholar ] [ CrossRef ]
  • Bastos, D.; Shackleton, M.; El-Moussa, F. Internet of Things: A Survey of Technologies and Security Risks in Smart Home and City Environments. In Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT, London, UK, 28–29 March 2018. [ Google Scholar ]
  • Gendreau, A.A.; Moorman, M. Survey of intrusion detection systems towards an end to end secure internet of things. In Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 22–24 August 2016; pp. 84–90. [ Google Scholar ]
  • Faisal, E.M.; Awad, A.I.; Hamed, H.F.A. Intrusion detection systems for IoT-based smart environments: A survey. J. Cloud Comput. 2018 , 7 , 1–20. [ Google Scholar ]
  • Datta, P.; Sharma, B. A survey on IoT architectures, protocols, security and smart city based applications. In Proceedings of the 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Delhi, India, 3–5 July 2017; pp. 1–5. [ Google Scholar ]
  • Sivaraman, V.; Gharakheili, H.H.; Vishwanath, A.; Boreli, R.; Mehani, O. Network-level security and privacy control for smart-home IoT devices. In Proceedings of the 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Abu Dhabi, United Arab Emirates, 19–21 October 2015; pp. 1–5. [ Google Scholar ]
  • Isam, W.; Thomson, C.; Ghaleb, B. An RPL based optimal sensors placement in pipeline monitoring WSNs. In International Conference on Emerging Technologies and Intelligent Systems ; Springer: Cham, Switzerland, 2021. [ Google Scholar ]
  • Li, H.; Chen, Y.; He, Z. The survey of RFID attacks and defenses. In Proceedings of the 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, 21–23 September 2012. [ Google Scholar ]
  • Yoon, S.; Park, H.; Yoo, H.S. Security issues on smarthome in IoT environment. In Computer Science and Its Applications ; Springer: Berlin/Heidelberg, Germany, 2015; pp. 691–696. [ Google Scholar ]
  • Fariha, K.; Gawade, A. Secure Data Management in Smart Meter as an Application of IoT. Int. J. Sci. Res. (IJSR) 2016 , 5 , 1335–1337. [ Google Scholar ]
  • Kim, J.T.S. Analyses of Open Security Issues for Smart Home and Sensor Network Based on Internet of Things. IoT Appl. Comput. 2022 , 11 , 179–196. [ Google Scholar ]
  • Karlof, C.; Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 2003 , 1 , 293–315. [ Google Scholar ] [ CrossRef ]
  • Gill, R.K.; Sachdeva, M. Detection of hello flood attack on LEACH in wireless sensor networks. In Next-Generation Networks ; Springer: Singapore, 2018; pp. 377–387. [ Google Scholar ]
  • Arabo, A.; Pranggono, B. Mobile malware and smart device security: Trends, challenges and solutions. In Proceedings of the 2013 19th International Conference on Control Systems and Computer Science, Bucharest, Romania, 29–31 May 2013; pp. 1–6. [ Google Scholar ]
  • Zhu, P.; Zhang, H.; Shi, Y.; Xie, W.; Pang, M.; Shi, Y. A novel discrete conformable fractional grey system model for forecasting carbon dioxide emissions. In Environment, Development and Sustainability ; Springer: Berlin/Heidelberg, Germany, 2024; pp. 1–29. [ Google Scholar ]
  • Xu, X.; Chen, J.; Zhang, L.; Zhang, Z. Investigating smart home assistant security: A systematic literature review. IEEE Access 2020 , 8 , 186500–186512. [ Google Scholar ]
  • Santani, A.; Gangaramani, M.; Chopra, B.; Choudhary, P.; Samdani, K. An overview of architecture and security issues of a smart TV. In Proceedings of the 6th International Conference on Communication and Electronics Systems (ICCES-2021), Coimbatre, India, 8–10 July 2021; pp. 1835–1843. [ Google Scholar ]
  • De Guzman, J.A.; Thilakarathna, K.; Seneviratne, A. Security and Privacy Approaches in Mixed Reality: A Literature Survey. ACM Comput. Surv. 2019 , 52 , 1–37. [ Google Scholar ] [ CrossRef ]
  • Abdi, N.; Ramokapane, K.M.; Such, J.M. More than smart speakers: Security and privacy perceptions of smart home personal assistants. In Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS 2019), USENIX Association, Santa Clara, CA, USA, 11–13 August 2019; pp. 451–466. [ Google Scholar ]
  • Zhang, L.; Wang, X.; Tan, Z.; Chen, J.; Xu, X.; Zhang, Z. Voice hacking: Evaluating voice-controlled smart home assistant’s vulnerability against replay attacks. IEEE Internet Things J. 2021 , 8 , 7319–7330. [ Google Scholar ]
  • Zhang, Z.; Chen, J. Voice assistant security: A review of attack scenarios and defenses. IEEE Secur. Priv. 2019 , 17 , 22–29. [ Google Scholar ]
  • Xiao, Y.; Jiang, C.; Huang, D.; Liang, K. Secure and efficient access control for smart home assistant. J. Ambient. Intell. Humaniz. Comput. 2021 , 12 , 4545–4554. [ Google Scholar ]
  • Obaid, A. Assessment of Smart Home Assistants as an IoT. Int. J. Comput. Inf. Manuf. (IJCIM) 2021 , 1 , 18–36. [ Google Scholar ] [ CrossRef ]
  • Alam, I.; Khusro, S.; Naeem, M. A review of smart TV: Past, present, and future. In Proceedings of the International Conference on Open Source Systems and Technologies (ICOSST), Lahore, Pakistan, 5 February 2018; pp. 35–41. [ Google Scholar ]
  • Bachy, Y.; Basse, F.; Nicomette, V.; Alata, E.; Kaaniche, M.; Courrege, J.; Lukjanenko, P. Smart-TV security analysis: Practical experiments. In Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Rio de Janeiro, Brazil, 22–25 June 2015; pp. 497–504. [ Google Scholar ]
  • Bao, L.; Wu, S.; Yu, S.; Huang, J. Client-side Security Assessment and Security Protection Scheme for Smart TV Network. In Proceedings of the 6th International Conference on Computer and Communications, Chengdu, China, 11–14 December 2020; pp. 573–578. [ Google Scholar ]
  • Zhang, Y.; Ma, S.; Chen, T.; Li, J.; Deng, R.H.; Bertino, E. EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. IEEE Trans. Dependable Secur. Comput. 2023 , 21 , 1544–1556. [ Google Scholar ] [ CrossRef ]
  • Claverie, T.; Lopes Esteves, J.; Kasmi, C. Smart TVs: Security of DVB-T. In Proceedings of the Information and Communications Technology Security Symposium (SSTIC), Rennes, France, 14 June 2018; pp. 73–106. [ Google Scholar ]
  • Aluri, D.C. Smart lock systems: An overview. Int. J. Comput. Appl. 2020 , 177 , 40–43. [ Google Scholar ]
  • Kalbo, N.; Mirsky, Y.; Shabtai, A.; Elovici, Y. The security of IP-Based video surveillance systems. Sensors 2020 , 20 , 4806. [ Google Scholar ] [ CrossRef ]
  • Nguyen, T. A deep look into privacy and security of vacuum robot. In Proceedings of the 20th Annual Cybersecurity & Awareness Fair (CyberFair), Pomona, CA, USA, 17 October 2024; pp. 1–7. [ Google Scholar ]
  • Ronen, E.; Shamir, A. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P), Saarbruecken, Germany, 21–24 March 2016; pp. 1–10. [ Google Scholar ] [ CrossRef ]
  • Huchuk, B.; Sanner, S.; O’Brien, W. Development and evaluation of data-driven controls for residential smart thermostats. Energy Build. 2021 , 249 , 111201. [ Google Scholar ] [ CrossRef ]
  • Hariadi, R.R.; Yuniarti, A.; Kuswardayan, I.; Herumurti, D.; Arifiani, S.; Yunanto, A.A. Termo: Smart air conditioner controller integrated with temperature and humidity sensor. In Proceedings of the 12th International Conference on Information & Communication Technology and System (ICTS), Surabaya, Indonesia, 18 July 2019; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Reid, S.E.; Abdulrazak, B.; Alas, M. Proof of Concept Evaluation for an Intelligent Oven. Enhanc. Qual. Life Smart Living 2017 , 10461 , 161–172. [ Google Scholar ]
  • Nasir, H.; Aziz, W.B.W.; Ali, F.; Kadir, K.; Khan, S. The Implementation of IoT based Smart Refrigerator System. In Proceedings of the 2nd International Conference on Smart Sensors and Application (ICSSA), Kuching, Malaysia, 24–26 July 2018; pp. 48–52. [ Google Scholar ]
  • Gomes, L.; Sousa, F.; Vale, Z. An Intelligent Smart Plug with Shared Knowledge Capabilities. Sensors 2018 , 18 , 3961. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Horák, T.; Huraj, L. Smart Thermostat as a Part of IoT Attack. In Proceedings of the 8th Computer Science On-line Conference, Cybernetics and Automation Control Theory Methods in Intelligent Algorithms (AISC), Zlin, Czech Republic, 24–27 April 2019; Volume 3, pp. 156–163. [ Google Scholar ]
  • Wang, A.; Nirjon, S. A False Sense of Home Security—Exposing the Vulnerability in Away Mode of Smart Plugs. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kyoto, Japan, 11–15 March 2019; pp. 316–321. [ Google Scholar ] [ CrossRef ]
  • Liu, P.; Ji, S.; Fu, L.; Lu, K.; Zhang, X.; Qin, J.; Wang, W.; Chen, W. How IoT re-using threatens your sensitive data: Exploring the User-Data disposal in used IoT devices. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 21–25 May 2023; pp. 1–17. [ Google Scholar ] [ CrossRef ]
  • Shuhaiber, A.; Ahim Mashal, I. Understanding users’ acceptance of smart homes. Technol. Soc. 2010 , 58 , 1011109. [ Google Scholar ] [ CrossRef ]
  • Këpuska, V.; Bohouta, G. Next-generation of virtual personal assistants (Microsoft Cortana, Apple Siri, Amazon Alexa and Google Home). In Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2018; pp. 1–8. [ Google Scholar ]
  • Fruchter, N.; Liccardi, I. Consumer Attitudes Towards Privacy and Security in Home Assistants. In Proceedings of the CHI Conference on Human Factors in Computing Systems, New York, NY, USA, 21–26 April 2018; Article LBW050. pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Lei, X.; Tu, G.; Liu, A.X.; Li, C.; Xie, T. The Insecurity of Home Digital Voice Assistants-Vulnerabilities, Attacks and Countermeasures. In Proceedings of the IEEE Conference on Communications and Network Security (CNS), Beijing, China, 30 May–1 June 2018; pp. 1–9. [ Google Scholar ] [ CrossRef ]
  • Sudharsan, B.; Corcoran, P.; Ali, M.I. Smart speaker design and implementation with biometric authentication and advanced voice interaction capability. In Proceedings of the AIAI Irish Conference on Artificial Intelligence and Cognitive Science, Galway, Ireland, 5–6 December 2019; pp. 1–14. [ Google Scholar ]
  • Corbett, C.F.; Combs, E.M.; Wright, P.J.; Owens, O.L.; Stringfellow, I.; Nguyen, T.; Van Son, C.R. Virtual Home Assistant Use and Perceptions of Usefulness by Older Adults and Support Person Dyads. Int. J. Environ. Res. Public Health 2021 , 18 , 1113. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Diogo Vieira, A.; Leite, H.; Vitória Lachowski Volochtchu, A.K. The impact of voice assistant home devices on people with disabilities: A longitudinal study. Technol. Forecast. Soc. Change 2022 , 184 , 121961. [ Google Scholar ] [ CrossRef ]
  • Triyono, L.; Yudantoro, T.R.; Sukamto, S.; Hestinigsih, I. VeRO: Smart home assistant for blind with voice recognition. Mater. Sci. Eng. 2021 , 1108 , 012016. [ Google Scholar ] [ CrossRef ]
  • Beirl, D.; Rogers, Y.; Yuill, N. “Using Voice Assistant Skills in Family Life. In Proceedings of the International Conference on Computer Supported Collaborative Learning—A Wide Lens: Combining Embodied, Enactive, Extended, and Embedded Learning in Collaborative Settings (CSCL), Lyon, France, 17–21 June 2019; pp. 1–8. [ Google Scholar ]
  • Zhu, P.; Miao, C.; Wang, Z.; Li, X. Informational cascade, regulatory focus and purchase intention in online flash shopping. Electron. Commer. Res. Appl. 2023 , 62 , 16474–16496. [ Google Scholar ] [ CrossRef ]
  • Edu, J.S.; Such, J.M.; Suarez-Tangil, G. Smart home personal assistants: A security and privacy review. ACM Comput. Surv. 2019 , 53 , 116. [ Google Scholar ] [ CrossRef ]
  • Qamar, S.; Anwar, Z.; Afzal, M. A systematic threat analysis and defense strategies for the metaverse and extended reality systems. Comput. Secur. 2023 , 128 , 103127. [ Google Scholar ] [ CrossRef ]
  • Duezguen, R.; Mayer, P.; Das, S.; Volkamer, M. Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays. In Proceedings of the Who Are You?! Adventures in Authentication (WAY), Virtual Event, 7 August 2020; pp. 1–6. [ Google Scholar ]
  • Stephenson, S.; Pal, B.; Fan, S.; Fernandes, E.; Zhao, Y.; Chatterjee, R. SoK: Authentication in augmented and virtual reality. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 22–26 May 2022; pp. 267–284. [ Google Scholar ] [ CrossRef ]
  • Ali, M.; Naeem, F.; Kaddoum, G.; Hossain, E. Metaverse communications, networking, security, and applications: Research issues, State-of-the-Art, and future directions. IEEE Commun. Surv. Tutor. 2024 , 26 , 1238–1278. [ Google Scholar ] [ CrossRef ]
  • Buldeo Rai, H.; Verlinde, S.; Macharis, C. Unlocking the failed delivery problem? Opportunities and challenges for smart locks from a consumer perspective. Res. Transp. Econ. 2021 , 87 , 100753. [ Google Scholar ] [ CrossRef ]
  • Ho, G.; Leung, D.; Mishra, P.; Hosseini, A.; Song, D.; Wagner, D. Smart Locks: Lessons for Securing Commodity Internet of Things Devices. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS), Xi’an, China, 30 May–3 June 2016; pp. 461–472. [ Google Scholar ]
  • De Camargo Silva, L.; Samaniego, M.; Deters, R. IoT and Blockchain for Smart Locks. In Proceedings of the 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 17–19 October 2019; pp. 262–269. [ Google Scholar ]
  • Nadiya, U.; Ilham Rizqyawan, M.; Mahnedra, O. Blockchain-based Secure Data Storage for Door Lock System. In Proceedings of the 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, 20–21 November 2019; pp. 140–144. [ Google Scholar ]
  • Raizada, P.; Gupta, S.; Das, M.; Rastogi, P.; Arora, D. Smart Lock System using IoT, Embedded & Machine Learning. In Proceedings of the 7th International conference for Convergence in Technology (I2CT), Mumbai, India, 7–9 April 2022; pp. 1–8. [ Google Scholar ]
  • Hazazi, H.; Shehab, M. Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective of the End User. In Proceedings of the 9th Symposium on Usable Privacy and Security, USENIX, Anaheim, CA, USA, 7–8 August 2023; pp. 559–577. [ Google Scholar ]
  • Pandya, S.; Ghayvat, H.; Kotecha, K.; Awais, M.; Akbarzadeh, S.; Gope, P.; Mukhopadhyay, S.C.; Chen, W. Smart home anti-theft system: A novel approach for near real-time monitoring and smart home security for wellness protocol. Appl. Syst. Innov. 2018 , 1 , 42. [ Google Scholar ] [ CrossRef ]
  • Abdalla, P.A.; Varol, C. Testing IoT security: The case study of an IP camera. In Proceedings of the 8th International Symposium on Digital Forensics and Security (ISDFS), Beirut, Lebanon, 1–2 June 2020; pp. 1–5. [ Google Scholar ]
  • Tekeoglu, A.; Saman Tosun, A. Investigating security and privacy of a cloud-based wireless IP camera: NetCAM. In Proceedings of the 24th International Conference on Computer Communication and Networks (ICCCN), Las Vegas, NV, USA, 3–6 August 2015; pp. 1–6. [ Google Scholar ]
  • Stolojescu-Crisan, C.; Crisan, C.; Butunoi, B. Access control and surveillance in a smart home. High-Confid. Comput. 2022 , 2 , 1–9. [ Google Scholar ] [ CrossRef ]
  • Wan, Y.; Xu, K.; Xue, G.; Wang, F. IoTArgos: A multi-layer security monitoring system for Internet-of-Things in smart homes. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Toronto, ON, Canada, 6–9 July 2020; pp. 1–10. [ Google Scholar ]
  • Sami, S.; Dai, Y.; Tan, S.R.X.; Roy, N.; Han, J. Spying with your robot vacuum cleaner: Eavesdropping via lidar sensors. In Proceedings of the 18th ACM Conference on Embedded Networked Sensor Systems (SenSys’20), Virtual Event, Japan, 16–19 November 2020; pp. 1–14. [ Google Scholar ]
  • ISO/IEC 30141:2018 ; Internet of Things (IoT) Reference Architecture. 2018. Available online: https://www.iso.org/standard/65695.html (accessed on 19 February 2024).
  • Kim, S. IEEE 2413-2029 ; IEEE Standard for an Architectural Framework for the Internet of Things (IoT). IEEE Standards Association, 2019. Available online: https://standards.ieee.org/ieee/2413/6226/ (accessed on 19 February 2024).
  • Iiconsortium. The Industrial Internet Reference Architecture. Industry IoT Consortium. 2022. Available online: https://www.iiconsortium.org/iira/ (accessed on 19 February 2024).
  • OCF. OCF Specification 2.2.7. Open Connectivity Foundation, 2021. Available online: https://openconnectivity.org/developer/specifications/ (accessed on 19 February 2024).
  • NIST. NIST Cybersecurity Framework 2.0. 2024. Available online: https://csrc.nist.gov/pubs/cswp/29/the-nist-cybersecurity-framework-20/ipd (accessed on 19 February 2024).
  • Vo, J. NIST SP 800-13–Network of Things. NIST, 2016. Available online: https://csrc.nist.gov/pubs/sp/800/183/final (accessed on 19 February 2024).
  • Wu, M.; Lu, T.J.; Ling, F.Y.; Sun, J.; Du, H.Y. Research on the architecture of Internet of Things. In Proceedings of the 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, China, 20–22 August 2010; pp. 484–487. [ Google Scholar ]
  • Khattak, H.A.; Shah, M.A.; Khan, S.; Ali, I.; Imran, M. Perception layer security in Internet of Things. Futur. Gener. Comput. Syst. 2019 , 100 , 144–164. [ Google Scholar ] [ CrossRef ]
  • Li, S.; Tryfonas, T.; Li, H. The internet of things: A security point of view. Internet Res. 2016 , 26 , 337–359. [ Google Scholar ] [ CrossRef ]
  • Sethi, P.; Sarangi, S.R. Internet of things: Architectures, protocols, and applications. J. Electr. Comput. Eng. 2017 , 2017 , 1–25. [ Google Scholar ] [ CrossRef ]
  • Suo, H.; Wan, J.; Zou, C.; Liu, J. Security in the internet of things: A review. In Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China, 23–25 March 2012; Volume 3, p. 373. [ Google Scholar ] [ CrossRef ]
  • Ghafir, I.; Prenosil, V.; Alhejailan, A.; Hammoudeh, M. Social engineering attack strategies and defence approaches. In Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 22–24 August 2016; pp. 145–149. [ Google Scholar ]
  • He, D.; Ye, R.; Chan, S.; Guizani, M.; Xu, Y. Privacy in the internet of things for smart healthcare. IEEE Commun. Mag. 2018 , 56 , 38–44. [ Google Scholar ] [ CrossRef ]
  • Kozlov, D.; Veijalainen, J.; Ali, Y. Security and privacy threats in IoT architectures. In Proceedings of the 7th International Conference on Body Area Networks (BODYNETS), Oslo, Norway, 24–26 September 2012; pp. 1–7. [ Google Scholar ]
  • Xu, X. Study on security problems and key technologies of the internet of things. In Proceedings of the 2013 International Conference on Computational and Information Sciences, Shiyang, China, 21–23 June 2013. [ Google Scholar ] [ CrossRef ]
  • Nirmal, K.; Janet, B.; Kumar, R. Analyzing and eliminating phishing threats in IoT, network and other web applications using iterative intersection. Peer-to-Peer Netw. Appl. 2021 , 14 , 2327–2339. [ Google Scholar ] [ CrossRef ]
  • Whittaker, C.; Ryner, B.; Nazif, M. Large-scale automatic classification of phishing pages. In Proceedings of the Network and Distributed System Security Symposium (Ndss), San Diego, CA, USA, 28 February–3 March 2010; pp. 1–14. [ Google Scholar ]
  • Deogirikar, J.; Vidhate, A. Security attacks in IoT: A survey. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10–11 February 2017; pp. 32–37. [ Google Scholar ]
  • Wei, D.; Qiu, X. Status-based detection of malicious code in Internet of Things (IoT) devices. In Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, 30 May–1 June 2018; pp. 1–7. [ Google Scholar ]
  • Sharma, P.; Zawar, S.; Pati, S.B. Ransomware analysis: Internet of Things (Iot) security issues challenges and open problems in the context of worldwide scenario of security of systems and malware attacks. Manag. J. Innov. Res. Sci. Eng. (IJIRSE) 2016 , 2 , 177–184. [ Google Scholar ]
  • Stamelos, I.; Hatzivasilis, G.; Ioannidis, S. Active HoneyFiles for Ransomware Encryption Mitigation. In Proceedings of the IEEE International Conference on Cyber Security and Resilience (IEEE CSR) Workshops, London, UK, 2–4 September 2024; pp. 1–8. [ Google Scholar ]
  • Cesare, S. Breaking the security of physical devices. In Proceedings of the Black Hat USA 2014, Las Vegas, NV, USA, 2–7 August 2014; pp. 1–7. [ Google Scholar ]
  • Hossain, M.M.; Fotouhi, M.; Hasan, R. Towards an analysis of security issues, challenges, and open problems in the internet of things. In Proceedings of the 2015 IEEE World Congress on Services, New York, NY, USA, 27 June–2 July 2015; pp. 21–28. [ Google Scholar ]
  • Varga, P.; Plosz, S.; Soos, G.; Hegedus, C. Security threats and issues in automation IoT. In Proceedings of the 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), Trondheim, Norway, 31 May–2 June 2017; pp. 1–6. [ Google Scholar ]
  • Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019 , 7 , 82721–82743. [ Google Scholar ] [ CrossRef ]
  • Zhao, W.; Yang, S.; Luo, X. On threat analysis of IoT-based systems: A survey. In Proceedings of the 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), Beijing, China, 14–16 August 2020; pp. 205–212. [ Google Scholar ]
  • Kim, D. Cyber security issues imposed on nuclear power plants. Ann. Nucl. Energy. 2014 , 65 , 141–143. [ Google Scholar ] [ CrossRef ]
  • Denning, D.E. Stuxnet: What has changed? Future Internet 2012 , 4 , 672–687. [ Google Scholar ] [ CrossRef ]
  • Ko, E.; Kim, T.; Kim, H. Management platform of threats information in IoT environment. J. Ambient. Intell. Humaniz. Comput. 2018 , 9 , 1167–1176. [ Google Scholar ] [ CrossRef ]
  • Ganguly, P.; Nasipuri, M.; Dutta, S. A novel approach for detecting and mitigating the energy theft issues in the smart metering infrastructure. Technol. Econ. Smart Grids Sustain. Energy. 2018 , 3 , 1–11. [ Google Scholar ] [ CrossRef ]
  • Alnaeli, S.M.; Sarnowski, M.; Aman, M.S.; Abdelgawad, A.; Yelamarthi, K. Vulnerable C/C++ code usage in IoT software systems. In Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 348–352. [ Google Scholar ]
  • Werner, M.; Unterluggauer, T.; Schaffenrath, D.; Mangard, S. Sponge-based control-flow protection for IoT devices. In Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, 24–26 April 2018; pp. 214–226. [ Google Scholar ]
  • Mujica, G.; Portilla, J. Distributed reprogramming on the edge: A new collaborative code dissemination strategy for IoT. Electronics 2019 , 8 , 267. [ Google Scholar ] [ CrossRef ]
  • Abbas, S.G.; Vaccari, I.; Hussain, F.; Zahid, S.; Fayyaz, U.U.; Shah, G.A.; Bakhshi, T.; Cambiaso, E. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Sensors 2021 , 21 , 4816. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Li, X.; Zhang, D.; Wu, B. Detection method of phishing email based on persuasion principle. In Proceedings of the IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing, China, 12–14 June 2020; pp. 571–574. [ Google Scholar ] [ CrossRef ]
  • Nishikawa, H.; Yamamoto, T.; Harsham, B.; Wang, Y.; Uehara, K.; Hori, C.; Iwasaki, A.; Kawauchi, K.; Nishigaki, M. Analysis of Malicious Email Detection using Cialdini’s Principles. In Proceedings of the 15th Asia Joint Conference on Information Security (AsiaJCIS), Taipei, Taiwan, 20–21 August 2020; pp. 137–142. [ Google Scholar ]
  • Sonowal, G. Phishing Email Detection Based on Binary Search Feature Selection. SN Comput. Sci. 2020 , 1 , 191. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Sahingoz, O.K.; Buber, E.; Demir, O.; Diri, B. Machine learning based phishing detection from URLs. Expert. Syst. Appl. 2019 , 117 , 345–357. [ Google Scholar ] [ CrossRef ]
  • Ficco, M. Detecting IoT malware by Markov chain behavioral models. In Proceedings of the IEEE International Conference on Cloud En-gineering (IC2E), Prague, Czech Republic, 24–27 June 2019; pp. 229–234. [ Google Scholar ] [ CrossRef ]
  • Sharmeen, S.; Huda, S.; Abawajy, J.H.; Ismail, W.N.; Hassan, M.M. Malware threats and detection for industrial Mobile-IoT networks. IEEE Access 2018 , 6 , 15941–15957. [ Google Scholar ] [ CrossRef ]
  • Wang, W.; Zhao, M.; Gao, Z.; Xu, G.; Xian, H.; Li, Y.; Zhang, X. Constructing features for detecting android malicious applications: Issues, taxonomy and directions. IEEE Access 2019 , 7 , 67602–67631. [ Google Scholar ] [ CrossRef ]
  • Nimmy, K.; Sankaran, S.; Achuthan, K. A novel multi-factor authentication protocol for smart home environments. In Information Systems Security (ICISS) ; Springer: Cham, Germany, 2018; Volume 11281, pp. 44–63. [ Google Scholar ]
  • Nimmy, K.; Sankaran, S.; Achuthan, K.; Calyam, P. Lightweight and privacy-preserving remote user authentication for smart homes. IEEE Access 2022 , 10 , 176–190. [ Google Scholar ] [ CrossRef ]
  • Nagy, R.; Németh, K.; Papp, D.; Buttyán, L. Rootkit detection on embedded IoT devices. Acta Cybern. 2021 , 25 , 369–400. [ Google Scholar ] [ CrossRef ]
  • Haney, J.M.; Furman, S.M. Smart Home Updates: User Perceptions and Experiences. In Proceedings of the Symposium on Security and Privacy (SP), San Francisco, CA, USA, 21–25 May 2023; pp. 1–5. [ Google Scholar ]
  • Haney, J.M.; Furman, S.M. Work in progress: Towards usable updates for smart home devices. In Proceedings of the Socio-Technical Aspects in Security and Trust (STAST), Virtual Event, 14 September 2020; Springer: Cham, Switzerland, 2021; Volume 12812, pp. 107–117. [ Google Scholar ]
  • Classen, J.; Chen, J.; Steinmetzer, D.; Hollick, M.; Knightly, E. The spy next door: Eavesdropping on high throughput visible light communications. In Proceedings of the 2nd International Workshop on Visible Light Communications Systems, New York, NY, USA, 11 September 2015; pp. 9–14. [ Google Scholar ]
  • Kaur, M.; Kalra, S. Security in IoT-Based smart grid through quantum key distribution. Adv. Intell. Syst. Comput. 2018 , 2 , 523–530. [ Google Scholar ] [ CrossRef ]
  • Fakhri, D.; Kusprasapta, M. Secure IoT communication using blockchain technology. In Proceedings of the 2018 international Symposzium on Electronics and Smart Devices (ISESD), Bandung, Indonesia, 23–24 October 2018; pp. 1–6. [ Google Scholar ]
  • Das, D.; Maity, S.; Nasir, S.B.; Ghosh, S.; Raychowdhury, A.; Sen, S. High efficiency power side-channel attack immunity using noise injection in attenuated signature domain. In Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Mclean, VA, USA, 1–5 May 2017; pp. 62–67. [ Google Scholar ]
  • Siddiqui, S.T.; Alam, S.; Ahmad, R.; Shuaib, M. Security threats, attacks, and possible countermeasures in internet of things. Lect. Notes Netw. Syst. 2020 , 35–46. [ Google Scholar ] [ CrossRef ]
  • Hariri, R.H.; Fredericks, E.M.; Bowers, K.M. Uncertainty in big data analytics: Survey, opportunities, and challenges. J. Big Data 2019 , 6 , 1–16. [ Google Scholar ] [ CrossRef ]
  • Kanuparthi, A.; Karri, R.; Addepalli, S. Hardware and embedded security in the context of internet of things. In Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles, Berlin, Germany, 4 November 2013; pp. 61–64. [ Google Scholar ] [ CrossRef ]
  • Abrishamchi, M.N.; Abdullah, A.H.; Cheok, A.D.; Nikolic, P.K. A probability based hybrid energy-efficient privacy preserving scheme to encounter with wireless traffic snooping in smart home. In Proceedings of the 2nd EAI International Summit, Smart City 360°, Bratislava, Slovakia, 22–24 November 2017; pp. 1–10. [ Google Scholar ]
  • Zeng, X.; Martinez, T. A noise filtering method using neural networks. In Proceedings of the IEEE International Workshop on Soft Computing Techniques in Instrumentation, Measurement and Related Applications, Provo, UT, USA, 17 May 2003; pp. 26–31. [ Google Scholar ]
  • Li, Z.; Yin, X.; Geng, Z.; Zhang, H.; Li, P.; Sun, Y.; Zhang, H.; Li, L. Research on PKI-like Protocol for the Internet of Things. In Proceedings of the 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation, Hong Kong, China, 16–17 January 2013; pp. 915–918. [ Google Scholar ]
  • Liu, Y.; Briones, J.; Zhou, R.; Magotra, N. Study of secure boot with a FPGA-based IoT device. In Proceedings of the 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), Boston, MA, USA, 6–9 August 2017; pp. 1053–1056. [ Google Scholar ]
  • Arış, A.; Oktuğ, S.F.; Yalçın, S.B.Ö. Internet-of-Things security: Denial of service attacks. In Proceedings of the 2015 23rd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey, 16–19 May 2015; pp. 1–4. [ Google Scholar ]
  • Abhishek, N.V.; Tandon, A.; Lim, T.J.; Sikdar, B. Detecting forwarding misbehavior in clustered IoT networks. In Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Montrea, QC, Canada, 28 October–2 November 2018; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Ande, R.; Adebisi, B.; Hammoudeh, M.; Saleem, J. Internet of things: Evolution and technologies from a security perspective. Sustain. Cities Soc. 2020 , 54 , 101728. [ Google Scholar ] [ CrossRef ]
  • Ashibani, Y.; Mahmoud, Q.H. A behavior profiling model for user authentication in IoT networks based on app usage patterns. In Proceedings of the IECON 2018—44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, 21–23 October 2018; pp. 2841–2846. [ Google Scholar ] [ CrossRef ]
  • Hossain, M.; Riazul Islam, S.M.; Ali, F.; Kwak, K.; Hasan, R. An internet of things-based health prescription assistant and its security system design. Futur. Gener. Comput. Syst. 2018 , 82 , 422–439. [ Google Scholar ] [ CrossRef ]
  • Hussain, F.; Hussain, R.; Hassan, S.A.; Hossain, E. Machine learning in IoT security: Current solutions and future challenges. IEEE Commun. Surv. Tutor. 2020 , 22 , 1686–1721. [ Google Scholar ] [ CrossRef ]
  • Arora, A.; Kaur, A.; Bhushan, B.; Saini, H. Security concerns and future trends of internet of things. In Proceedings of the 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kannur, India, 5–6 July 2019; pp. 891–896. [ Google Scholar ]
  • Asif, W.; Ray, I.G.; Rajarajan, M. An attack tree based risk evaluation approach for the internet of things. In Proceedings of the 8th International Conference on the Internet of Things, Santa Barbara, CA, USA, 15–18 October 2018; pp. 1–8. [ Google Scholar ] [ CrossRef ]
  • Dwivedi, A.D.; Srivastava, G.; Dhar, S.; Singh, R. A decentralized Privacy-Preserving healthcare blockchain for IoT. Sensors 2019 , 19 , 326. [ Google Scholar ] [ CrossRef ]
  • Aziz, T.; Haq, E. Security challenges facing IoT layers and its protective measures. Int. J. Comput. Appl. 2018 , 179 , 31–35. [ Google Scholar ] [ CrossRef ]
  • Kim, Y.; Yoo, S.; Yoo, C. DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things. In Proceedings of the 2015 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 9–12 January 2015; pp. 196–197. [ Google Scholar ]
  • Kamel, S.O.; Hegazi, N.H. A proposed model of IoT security management system based on a study of internet of things (IoT) security. Int. J. Sci. Eng. Res. 2018 , 9 , 1227–1244. [ Google Scholar ]
  • Hatzivasilis, G.; Soultatos, O.; Chatziadam, P.; Fysarakis, K.; Askoxylakis, I.; Ioannidis, S.; Alexandris, G.; Katos, V.; Spanoudakis, G. WARDOG: Awareness detection watchdog for botnet infection on the host device. IEEE Trans. Sustain. Comput. 2019 , 4 , 1–15. [ Google Scholar ] [ CrossRef ]
  • Aliyu, F.; Sheltami, T.; Shakshuki, E.M. A detection and prevention technique for man in the middle attack in fog computing. Procedia Comput. Sci. 2018 , 141 , 24–31. [ Google Scholar ] [ CrossRef ]
  • Ameer, S.; Benson, J.; Sandhu, R. An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach. Information 2022 , 13 , 60. [ Google Scholar ] [ CrossRef ]
  • Hatzivasilis, G.; Papaefstathiou, I.; Manifavas, C. SCOTRES: Secure Routing for IoT and CPS. IEEE Internet Things J. (IoT) 2017 , 4 , 2129–2141. [ Google Scholar ] [ CrossRef ]
  • Rajora, C.S.; Sharma, A. IoT Based Smart Home with Cutting-Edge Technology for IDS/IPS. In Proceedings of the 2nd International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE), Bangalore, India, 16–17 December 2022; pp. 1–5. [ Google Scholar ]
  • Atlam, H.F.; Wills, G.B. IoT security, privacy, safety and ethics. In Digital Twin Technologies and Smart Cities ; Springer: Cham, Switzerland, 2020; pp. 123–149. [ Google Scholar ]
  • Ida, I.B.; Jemai, A.; Loukil, A. A survey on security of IoT in the context of eHealth and clouds. In Proceedings of the 2016 11th International Design & Test Symposium (IDT), Hammamet, Tunisia, 18–20 December 2016; pp. 25–30. [ Google Scholar ]
  • Andrea, I.; Chrysostomou, C.; Hadjichristofi, G. Internet of Things: Security vulnerabilities and challenges. In Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 180–187. [ Google Scholar ]
  • Meng, S.; Gao, Z.; Li, Q.; Wang, H.; Dai, H.N.; Qi, L. Security-Driven hybrid collaborative recommendation method for cloud-based iot services. Comput. Secur. 2020 , 97 , 101950. [ Google Scholar ] [ CrossRef ]
  • Jayakumar, H.; Raha, A.; Kim, Y.; Sutar, S.; Lee, W.S.; Raghunathan, V. Energy-efficient system design for IoT devices. In Proceedings of the 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Macao, China, 25–28 January 2016; pp. 298–301. [ Google Scholar ]
  • Kalra, N.; Sharma, A.; Kumar, N.; Singh, R.; Gehlot, A. Design and development of IoT-based transmission line monitoring system. In Intelligent Communication, Control and Devices ; Springer: Singapore, 2018; pp. 465–471. [ Google Scholar ]
  • Dou, Z.; Si, G.; Lin, Y.; Wang, M. An adaptive resource allocation model with anti-jamming in IoT network. IEEE Access 2019 , 7 , 93250–93258. [ Google Scholar ] [ CrossRef ]
  • Choi, J.; Jin, S.I. Security threats in connected car environment and proposal of in-vehicle infotainment-based access control mechanism. In Advanced Multimedia and Ubiquitous Engineering ; Springer: Singapore, 2018; pp. 383–388. [ Google Scholar ]
  • Rodrigues, L.; Guerreiro, J.; Correia, N. RELOAD/CoAP architecture for the federation of wireless sensor networks. Peer-to-Peer Netw. Appl. 2020 , 13 , 27–37. [ Google Scholar ] [ CrossRef ]
  • Jeyaselvi, M.; Sathya, M.; Suchitra, S.; Jafar Ali Ibrahim, S.; Kalyan Chakravarthy, N.S. SVM-Based Cloning and Jamming Attack Detection in IoT Sensor Networks. In Advances in Information Communication Technology and Computing ; Springer: Singapore, 2022; Volume 392, pp. 461–471. [ Google Scholar ]
  • Mbarek, B.; Ge, M.; Pitner, T. Trust-Based Authentication for Smart Home Systems. In Wireless Personal Communications ; Springer: Berlin/Heidelberg, Germany, 2021; Volume 117, pp. 2157–2172. [ Google Scholar ]

Click here to enlarge figure

LayerThreatsCountermeasures
ApplicationSocial-engineering and phishingThreat modeling [ ], ML detection [ , ], user training, and raising awareness [ , ]
Installation of malicious software and applicationsCode and application analysis [ , , ]
Attacks on access controlMulti-factor authentication [ ], privacy preserving authentication [ ]
Rootkit attacksRootkit detection with TEE [ ]
Failure to install security patches and updatesUser education [ ]
PerceptionEavesdropping and sniffing attacksOperate within private networks and transmission of fake packets protocol [ ]
Side-channel attacksEncrypted communication [ ]
Noise in dataAI and neural network anomaly detection [ ]
Booting attacksSecure booting with encryption and authentication [ ]
NetworkDoSWARDOG device notification and mitigation mechanism [ ]
Man-in-the-middleMulti-factor authentication of device and server [ ]
Unauthorized accessAttribute-based access control with HABACα [ ]
Routing and forwarding attacksTrust-based computing with SCOTRES [ ]
Traffic analysisIDS/IPS [ ]
PhysicalLoss of power and environmental threatsN/A
CloningQuantum key distribution [ ]
JammingML with SVM classifiers [ ], trust-based authentication with TRAS [ ]
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Vardakis, G.; Hatzivasilis, G.; Koutsaki, E.; Papadakis, N. Review of Smart-Home Security Using the Internet of Things. Electronics 2024 , 13 , 3343. https://doi.org/10.3390/electronics13163343

Vardakis G, Hatzivasilis G, Koutsaki E, Papadakis N. Review of Smart-Home Security Using the Internet of Things. Electronics . 2024; 13(16):3343. https://doi.org/10.3390/electronics13163343

Vardakis, George, George Hatzivasilis, Eleftheria Koutsaki, and Nikos Papadakis. 2024. "Review of Smart-Home Security Using the Internet of Things" Electronics 13, no. 16: 3343. https://doi.org/10.3390/electronics13163343

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

4,500 students to receive free AI training by end-2025

4,500 students to receive free AI training by end-2025

  • Share on Twitter
  • Share on WhatsApp
  • E-mail this article
  • 0 Engagements

More adults and students will have access to free online training in artificial intelligence (AI) and other technology topics over the next year announced global tech company IBM on Aug 23.

IBM announced a collaboration with Republic Polytechnic (RP), Singapore Polytechnic (SP) and training provider Junior Achievement (JA) to use and adapt lessons from some 1,000 tech-related courses in the IBM SkillsBuild platform for an estimated 4,500 students and adult learners over one year.

The collaboration was announced at the IBM office at Marina Bay Financial Centre, where Minister of State for Digital Development and Information Rahayu Mahzam, who was the guest of honour, welcomed the collaboration for it can help locals find new job opportunities and acquire tech skills which are in short supply.

Building an AI-equipped workforce would require “a proactive approach by going upstream to prepare our youths even before they enter the workforce,” said Ms Rahayu on Aug 23.

She said: “It includes integrating AI education and digital literacy into vocational training and equipping them with the foundational skills required to do well in a rapidly changing job market.”

SkillsBuild courses are available for free as part of IBM’s goal to provide online training to 30 million people globally by 2030. According to IBM chief impact officer and vice president Justina Nixon-Saintil, some 11.5 million people have used the educational platform, which was launched in 2021, as at the end of 2023.

Minister for Digital Development and Information Josephine Teo described IBM as a longstanding partner of Singapore in the area of AI.

IBM, NUS to set up new AI research and innovation centre

Related stories, jb city councils installing ai cameras, smart traffic lights, irish boy band westlife release mandarin song with help of ai, netizens wowed by how jackie chan, 70, looks 27 in a legend.

Ms Nixon-Saintil said that one way to reach keen learners is to collaborate with schools.

SP will be tapping on SkillsBuild’s AI, data and cybersecurity courses to support learning for their computing courses, while RP plans to introduce it into its curriculum, specifically to train students in data sciences and AI skills, among other topics.

Both polytechnics will also explore using the resources in common curriculum modules to ensure all students are well versed in AI.

Mr Loh Yew Chiong, SP’s deputy principal, said the online courses can be utilised as quizzes for lecturers to keep track of students’ understanding of AI subjects.

Students will also be encouraged to complete AI or other courses to attain IBM’s professional certifications, which help to enhance their portfolio when applying for jobs, said Mr Loh.

RP chief technology officer Fong Yew Chan said IBM SkillsBuild provides plenty of useful material that adds on to the school’s curriculum. 

Non-profit organisation JA, which organises career and financial literacy workshops in schools, aims to use the online resources to support the learning of roughly 3,000 students within a year, said executive director Ng Hau Yee.

Ms Ng said: “If you tell kids to go online to do a quiz, they probably won’t do it by themselves. So we can use the modules to design our courses as a teaser to topics like AI and cybersecurity.”

There has been no shortage of efforts by schools and enterprises to build AI talent here following Prime Minister Lawrence Wong’s announcement in 2023 on Singapore’s renewed national AI strategy to triple its AI talent pool.

New degrees and scholarship programmes have since been offered at the Nanyang Technological University, backed by an initial $4 million to support AI education and research in 2024.

Besides its dedicated AI degrees and minor in AI on offer to students, Singapore University of Technology and Design introduced AI courses for adult learners in 2024. These include classes on using generative AI and understanding the science behind such programs.

Even professionals in non-IT sectors like logistics and finance have been sent to attend tech training sessions to acquire digital skills through efforts by the authorities and trade associations.

Get The New Paper on your phone with the free TNP app. Download from the Apple App Store  or Google Play Store now

  • Share on Facebook
  • Article Information

Data Sharing Statement

  • As Ozempic’s Popularity Soars, Here’s What to Know About Semaglutide and Weight Loss JAMA Medical News & Perspectives May 16, 2023 This Medical News article discusses chronic weight management with semaglutide, sold under the brand names Ozempic and Wegovy. Melissa Suran, PhD, MSJ
  • Patents and Regulatory Exclusivities on GLP-1 Receptor Agonists JAMA Special Communication August 15, 2023 This Special Communication used data from the US Food and Drug Administration to analyze how manufacturers of brand-name glucagon-like peptide 1 (GLP-1) receptor agonists have used patent and regulatory systems to extend periods of market exclusivity. Rasha Alhiary, PharmD; Aaron S. Kesselheim, MD, JD, MPH; Sarah Gabriele, LLM, MBE; Reed F. Beall, PhD; S. Sean Tu, JD, PhD; William B. Feldman, MD, DPhil, MPH
  • What to Know About Wegovy’s Rare but Serious Adverse Effects JAMA Medical News & Perspectives December 12, 2023 This Medical News article discusses Wegovy, Ozempic, and other GLP-1 receptor agonists used for weight management and type 2 diabetes. Kate Ruder, MSJ
  • GLP-1 Receptor Agonists and Gastrointestinal Adverse Events—Reply JAMA Comment & Response March 12, 2024 Ramin Rezaeianzadeh, BSc; Mohit Sodhi, MSc; Mahyar Etminan, PharmD, MSc
  • GLP-1 Receptor Agonists and Gastrointestinal Adverse Events JAMA Comment & Response March 12, 2024 Karine Suissa, PhD; Sara J. Cromer, MD; Elisabetta Patorno, MD, DrPH
  • GLP-1 Receptor Agonist Use and Risk of Postoperative Complications JAMA Research Letter May 21, 2024 This cohort study evaluates the risk of postoperative respiratory complications among patients with diabetes undergoing surgery who had vs those who had not a prescription fill for glucagon-like peptide 1 receptor agonists. Anjali A. Dixit, MD, MPH; Brian T. Bateman, MD, MS; Mary T. Hawn, MD, MPH; Michelle C. Odden, PhD; Eric C. Sun, MD, PhD
  • Glucagon-Like Peptide-1 Receptor Agonist Use and Risk of Gallbladder and Biliary Diseases JAMA Internal Medicine Original Investigation May 1, 2022 This systematic review and meta-analysis of 76 randomized clinical trials examines the effects of glucagon-like peptide-1 receptor agonist use on the risk of gallbladder and biliary diseases. Liyun He, MM; Jialu Wang, MM; Fan Ping, MD; Na Yang, MM; Jingyue Huang, MM; Yuxiu Li, MD; Lingling Xu, MD; Wei Li, MD; Huabing Zhang, MD
  • Cholecystitis Associated With the Use of Glucagon-Like Peptide-1 Receptor Agonists JAMA Internal Medicine Research Letter October 1, 2022 This case series identifies cases reported in the US Food and Drug Administration Adverse Event Reporting System of acute cholecystitis associated with use of glucagon-like peptide-1 receptor agonists that did not have gallbladder disease warnings in their labeling. Daniel Woronow, MD; Christine Chamberlain, PharmD; Ali Niak, MD; Mark Avigan, MDCM; Monika Houstoun, PharmD, MPH; Cindy Kortepeter, PharmD

See More About

Select your interests.

Customize your JAMA Network experience by selecting one or more topics from the list below.

  • Academic Medicine
  • Acid Base, Electrolytes, Fluids
  • Allergy and Clinical Immunology
  • American Indian or Alaska Natives
  • Anesthesiology
  • Anticoagulation
  • Art and Images in Psychiatry
  • Artificial Intelligence
  • Assisted Reproduction
  • Bleeding and Transfusion
  • Caring for the Critically Ill Patient
  • Challenges in Clinical Electrocardiography
  • Climate and Health
  • Climate Change
  • Clinical Challenge
  • Clinical Decision Support
  • Clinical Implications of Basic Neuroscience
  • Clinical Pharmacy and Pharmacology
  • Complementary and Alternative Medicine
  • Consensus Statements
  • Coronavirus (COVID-19)
  • Critical Care Medicine
  • Cultural Competency
  • Dental Medicine
  • Dermatology
  • Diabetes and Endocrinology
  • Diagnostic Test Interpretation
  • Drug Development
  • Electronic Health Records
  • Emergency Medicine
  • End of Life, Hospice, Palliative Care
  • Environmental Health
  • Equity, Diversity, and Inclusion
  • Facial Plastic Surgery
  • Gastroenterology and Hepatology
  • Genetics and Genomics
  • Genomics and Precision Health
  • Global Health
  • Guide to Statistics and Methods
  • Hair Disorders
  • Health Care Delivery Models
  • Health Care Economics, Insurance, Payment
  • Health Care Quality
  • Health Care Reform
  • Health Care Safety
  • Health Care Workforce
  • Health Disparities
  • Health Inequities
  • Health Policy
  • Health Systems Science
  • History of Medicine
  • Hypertension
  • Images in Neurology
  • Implementation Science
  • Infectious Diseases
  • Innovations in Health Care Delivery
  • JAMA Infographic
  • Law and Medicine
  • Leading Change
  • Less is More
  • LGBTQIA Medicine
  • Lifestyle Behaviors
  • Medical Coding
  • Medical Devices and Equipment
  • Medical Education
  • Medical Education and Training
  • Medical Journals and Publishing
  • Mobile Health and Telemedicine
  • Narrative Medicine
  • Neuroscience and Psychiatry
  • Notable Notes
  • Nutrition, Obesity, Exercise
  • Obstetrics and Gynecology
  • Occupational Health
  • Ophthalmology
  • Orthopedics
  • Otolaryngology
  • Pain Medicine
  • Palliative Care
  • Pathology and Laboratory Medicine
  • Patient Care
  • Patient Information
  • Performance Improvement
  • Performance Measures
  • Perioperative Care and Consultation
  • Pharmacoeconomics
  • Pharmacoepidemiology
  • Pharmacogenetics
  • Pharmacy and Clinical Pharmacology
  • Physical Medicine and Rehabilitation
  • Physical Therapy
  • Physician Leadership
  • Population Health
  • Primary Care
  • Professional Well-being
  • Professionalism
  • Psychiatry and Behavioral Health
  • Public Health
  • Pulmonary Medicine
  • Regulatory Agencies
  • Reproductive Health
  • Research, Methods, Statistics
  • Resuscitation
  • Rheumatology
  • Risk Management
  • Scientific Discovery and the Future of Medicine
  • Shared Decision Making and Communication
  • Sleep Medicine
  • Sports Medicine
  • Stem Cell Transplantation
  • Substance Use and Addiction Medicine
  • Surgical Innovation
  • Surgical Pearls
  • Teachable Moment
  • Technology and Finance
  • The Art of JAMA
  • The Arts and Medicine
  • The Rational Clinical Examination
  • Tobacco and e-Cigarettes
  • Translational Medicine
  • Trauma and Injury
  • Treatment Adherence
  • Ultrasonography
  • Users' Guide to the Medical Literature
  • Vaccination
  • Venous Thromboembolism
  • Veterans Health
  • Women's Health
  • Workflow and Process
  • Wound Care, Infection, Healing

Others Also Liked

  • Download PDF
  • X Facebook More LinkedIn

Sodhi M , Rezaeianzadeh R , Kezouh A , Etminan M. Risk of Gastrointestinal Adverse Events Associated With Glucagon-Like Peptide-1 Receptor Agonists for Weight Loss. JAMA. 2023;330(18):1795–1797. doi:10.1001/jama.2023.19574

Manage citations:

© 2024

  • Permissions

Risk of Gastrointestinal Adverse Events Associated With Glucagon-Like Peptide-1 Receptor Agonists for Weight Loss

  • 1 Faculty of Medicine, University of British Columbia, Vancouver, British Columbia, Canada
  • 2 StatExpert Ltd, Laval, Quebec, Canada
  • 3 Department of Ophthalmology and Visual Sciences and Medicine, University of British Columbia, Vancouver, Canada
  • Medical News & Perspectives As Ozempic’s Popularity Soars, Here’s What to Know About Semaglutide and Weight Loss Melissa Suran, PhD, MSJ JAMA
  • Special Communication Patents and Regulatory Exclusivities on GLP-1 Receptor Agonists Rasha Alhiary, PharmD; Aaron S. Kesselheim, MD, JD, MPH; Sarah Gabriele, LLM, MBE; Reed F. Beall, PhD; S. Sean Tu, JD, PhD; William B. Feldman, MD, DPhil, MPH JAMA
  • Medical News & Perspectives What to Know About Wegovy’s Rare but Serious Adverse Effects Kate Ruder, MSJ JAMA
  • Comment & Response GLP-1 Receptor Agonists and Gastrointestinal Adverse Events—Reply Ramin Rezaeianzadeh, BSc; Mohit Sodhi, MSc; Mahyar Etminan, PharmD, MSc JAMA
  • Comment & Response GLP-1 Receptor Agonists and Gastrointestinal Adverse Events Karine Suissa, PhD; Sara J. Cromer, MD; Elisabetta Patorno, MD, DrPH JAMA
  • Research Letter GLP-1 Receptor Agonist Use and Risk of Postoperative Complications Anjali A. Dixit, MD, MPH; Brian T. Bateman, MD, MS; Mary T. Hawn, MD, MPH; Michelle C. Odden, PhD; Eric C. Sun, MD, PhD JAMA
  • Original Investigation Glucagon-Like Peptide-1 Receptor Agonist Use and Risk of Gallbladder and Biliary Diseases Liyun He, MM; Jialu Wang, MM; Fan Ping, MD; Na Yang, MM; Jingyue Huang, MM; Yuxiu Li, MD; Lingling Xu, MD; Wei Li, MD; Huabing Zhang, MD JAMA Internal Medicine
  • Research Letter Cholecystitis Associated With the Use of Glucagon-Like Peptide-1 Receptor Agonists Daniel Woronow, MD; Christine Chamberlain, PharmD; Ali Niak, MD; Mark Avigan, MDCM; Monika Houstoun, PharmD, MPH; Cindy Kortepeter, PharmD JAMA Internal Medicine

Glucagon-like peptide 1 (GLP-1) agonists are medications approved for treatment of diabetes that recently have also been used off label for weight loss. 1 Studies have found increased risks of gastrointestinal adverse events (biliary disease, 2 pancreatitis, 3 bowel obstruction, 4 and gastroparesis 5 ) in patients with diabetes. 2 - 5 Because such patients have higher baseline risk for gastrointestinal adverse events, risk in patients taking these drugs for other indications may differ. Randomized trials examining efficacy of GLP-1 agonists for weight loss were not designed to capture these events 2 due to small sample sizes and short follow-up. We examined gastrointestinal adverse events associated with GLP-1 agonists used for weight loss in a clinical setting.

We used a random sample of 16 million patients (2006-2020) from the PharMetrics Plus for Academics database (IQVIA), a large health claims database that captures 93% of all outpatient prescriptions and physician diagnoses in the US through the International Classification of Diseases, Ninth Revision (ICD-9) or ICD-10. In our cohort study, we included new users of semaglutide or liraglutide, 2 main GLP-1 agonists, and the active comparator bupropion-naltrexone, a weight loss agent unrelated to GLP-1 agonists. Because semaglutide was marketed for weight loss after the study period (2021), we ensured all GLP-1 agonist and bupropion-naltrexone users had an obesity code in the 90 days prior or up to 30 days after cohort entry, excluding those with a diabetes or antidiabetic drug code.

Patients were observed from first prescription of a study drug to first mutually exclusive incidence (defined as first ICD-9 or ICD-10 code) of biliary disease (including cholecystitis, cholelithiasis, and choledocholithiasis), pancreatitis (including gallstone pancreatitis), bowel obstruction, or gastroparesis (defined as use of a code or a promotility agent). They were followed up to the end of the study period (June 2020) or censored during a switch. Hazard ratios (HRs) from a Cox model were adjusted for age, sex, alcohol use, smoking, hyperlipidemia, abdominal surgery in the previous 30 days, and geographic location, which were identified as common cause variables or risk factors. 6 Two sensitivity analyses were undertaken, one excluding hyperlipidemia (because more semaglutide users had hyperlipidemia) and another including patients without diabetes regardless of having an obesity code. Due to absence of data on body mass index (BMI), the E-value was used to examine how strong unmeasured confounding would need to be to negate observed results, with E-value HRs of at least 2 indicating BMI is unlikely to change study results. Statistical significance was defined as 2-sided 95% CI that did not cross 1. Analyses were performed using SAS version 9.4. Ethics approval was obtained by the University of British Columbia’s clinical research ethics board with a waiver of informed consent.

Our cohort included 4144 liraglutide, 613 semaglutide, and 654 bupropion-naltrexone users. Incidence rates for the 4 outcomes were elevated among GLP-1 agonists compared with bupropion-naltrexone users ( Table 1 ). For example, incidence of biliary disease (per 1000 person-years) was 11.7 for semaglutide, 18.6 for liraglutide, and 12.6 for bupropion-naltrexone and 4.6, 7.9, and 1.0, respectively, for pancreatitis.

Use of GLP-1 agonists compared with bupropion-naltrexone was associated with increased risk of pancreatitis (adjusted HR, 9.09 [95% CI, 1.25-66.00]), bowel obstruction (HR, 4.22 [95% CI, 1.02-17.40]), and gastroparesis (HR, 3.67 [95% CI, 1.15-11.90) but not biliary disease (HR, 1.50 [95% CI, 0.89-2.53]). Exclusion of hyperlipidemia from the analysis did not change the results ( Table 2 ). Inclusion of GLP-1 agonists regardless of history of obesity reduced HRs and narrowed CIs but did not change the significance of the results ( Table 2 ). E-value HRs did not suggest potential confounding by BMI.

This study found that use of GLP-1 agonists for weight loss compared with use of bupropion-naltrexone was associated with increased risk of pancreatitis, gastroparesis, and bowel obstruction but not biliary disease.

Given the wide use of these drugs, these adverse events, although rare, must be considered by patients who are contemplating using the drugs for weight loss because the risk-benefit calculus for this group might differ from that of those who use them for diabetes. Limitations include that although all GLP-1 agonist users had a record for obesity without diabetes, whether GLP-1 agonists were all used for weight loss is uncertain.

Accepted for Publication: September 11, 2023.

Published Online: October 5, 2023. doi:10.1001/jama.2023.19574

Correction: This article was corrected on December 21, 2023, to update the full name of the database used.

Corresponding Author: Mahyar Etminan, PharmD, MSc, Faculty of Medicine, Departments of Ophthalmology and Visual Sciences and Medicine, The Eye Care Center, University of British Columbia, 2550 Willow St, Room 323, Vancouver, BC V5Z 3N9, Canada ( [email protected] ).

Author Contributions: Dr Etminan had full access to all of the data in the study and takes responsibility for the integrity of the data and the accuracy of the data analysis.

Concept and design: Sodhi, Rezaeianzadeh, Etminan.

Acquisition, analysis, or interpretation of data: All authors.

Drafting of the manuscript: Sodhi, Rezaeianzadeh, Etminan.

Critical review of the manuscript for important intellectual content: All authors.

Statistical analysis: Kezouh.

Obtained funding: Etminan.

Administrative, technical, or material support: Sodhi.

Supervision: Etminan.

Conflict of Interest Disclosures: None reported.

Funding/Support: This study was funded by internal research funds from the Department of Ophthalmology and Visual Sciences, University of British Columbia.

Role of the Funder/Sponsor: The funder had no role in the design and conduct of the study; collection, management, analysis, and interpretation of the data; preparation, review, or approval of the manuscript; and decision to submit the manuscript for publication.

Data Sharing Statement: See Supplement .

  • Register for email alerts with links to free full-text articles
  • Access PDFs of free articles
  • Manage your interests
  • Save searches and receive search alerts

American Psychological Association

Style and Grammar Guidelines

APA Style provides a foundation for effective scholarly communication because it helps writers present their ideas in a clear, concise, and inclusive manner. When style works best, ideas flow logically, sources are credited appropriately, and papers are organized predictably. People are described using language that affirms their worth and dignity. Authors plan for ethical compliance and report critical details of their research protocol to allow readers to evaluate findings and other researchers to potentially replicate the studies. Tables and figures present information in an engaging, readable manner.

The style and grammar guidelines pages present information about APA Style as described in the Publication Manual of the American Psychological Association, Seventh Edition and the Concise Guide to APA Style, Seventh Edition . Any updates to APA Style are noted on the applicable topic pages. If you are still using the sixth edition, helpful resources are available in the sixth edition archive .

Looking for more style?

APA Style CENTRAL logo

  • Accessibility of APA Style
  • Line Spacing
  • Order of Pages
  • Page Header
  • Paragraph Alignment and Indentation
  • Sample Papers
  • Title Page Setup
  • Appropriate Level of Citation
  • Basic Principles of Citation
  • Classroom or Intranet Sources
  • Paraphrasing
  • Personal Communications
  • Quotations From Research Participants
  • Secondary Sources
  • Abbreviations
  • Capitalization
  • Italics and Quotation Marks
  • Punctuation
  • Spelling and Hyphenation
  • General Principles for Reducing Bias
  • Historical Context
  • Intersectionality
  • Participation in Research
  • Racial and Ethnic Identity
  • Sexual Orientation
  • Socioeconomic Status
  • Accessible Use of Color in Figures
  • Figure Setup
  • Sample Figures
  • Sample Tables
  • Table Setup
  • Archival Documents and Collections
  • Basic Principles of Reference List Entries
  • Database Information in References
  • DOIs and URLs
  • Elements of Reference List Entries
  • Missing Reference Information
  • Reference Examples
  • References in a Meta-Analysis
  • Reference Lists Versus Bibliographies
  • Works Included in a Reference List
  • Active and Passive Voice
  • Anthropomorphism
  • First-Person Pronouns
  • Logical Comparisons
  • Plural Nouns
  • Possessive Adjectives
  • Possessive Nouns
  • Singular “They”
  • Adapting a Dissertation or Thesis Into a Journal Article
  • Correction Notices
  • Cover Letters
  • Journal Article Reporting Standards (JARS)
  • Open Science
  • Response to Reviewers

IMAGES

  1. How to search and download research papers for FREE

    how to access research papers for free

  2. How to Access Free Research Papers Journals

    how to access research papers for free

  3. How to find and download research papers? Best free websites (tutorial) Google scholar

    how to access research papers for free

  4. how to download paid research papers for free|top 3 websites to download research papers for free

    how to access research papers for free

  5. How to Access Research Articles for Free

    how to access research papers for free

  6. How to download Research Papers for Free: A Comprehensive Guide

    how to access research papers for free

COMMENTS

  1. Unpaywall

    Unpaywall harvests over 50 million free articles from thousands of publishers and repositories, and makes them easy to find and use. Get the Unpaywall extension to access Open Access content from any source, or explore other ways to use Unpaywall data.

  2. Get Scholarly Articles for Free

    Get Scholarly Articles for Free. HOLLIS isn't the only way to access articles and library resources. Harvard Library has paid for your access to hundreds of websites — from the New York Review of Books to the Oxford English Dictionary to the journal Nature: Chemical Biology. You just need to connect via HarvardKey.

  3. 15 Best Websites to Download Research Papers for Free 2024

    Best Websites to Download Research Papers. #1. Sci-Hub - Best for Accessing Paywalled Academic Papers. Credits: Armacad. Summary. Unlocks millions of academic articles. Known as the 'Robin Hood' of research. Free and easy to use. Sci-Hub is the defiant maverick of the academic sphere.

  4. Open Research Library

    The Open Research Library (ORL) is planned to include all Open Access book content worldwide on one platform for user-friendly discovery, offering a seamless experience navigating more than 20,000 Open Access books.

  5. OA.mg

    OA.mg is a search engine for academic papers, specialising in Open Access. You can download and read over 240 million papers from various sources and fields with one click.

  6. Open and free content on JSTOR and Artstor

    JSTOR and Artstor offer millions of articles, ebooks, images, and media that are open access or free to everyone. Learn how to search, browse, and access these resources from libraries, publishers, and partners worldwide.

  7. CORE

    CORE is a comprehensive bibliographic database of the world's scholarly literature that provides both metadata and full text access to 259M papers from around the world. You can search, explore, and use CORE data for free through its APIs, datasets, and services.

  8. Directory of Open Access Journals

    DOAJ is a free and independent index of open access journals and articles from 134 countries and 80 languages. You can search, browse, and access thousands of journals and millions of articles without fees or registration.

  9. The best academic search engines [Update 2024]

    Learn how to find and access millions of research papers and scholarly sources for free using Google Scholar, BASE, CORE, Science.gov and others. Compare features, coverage, and export formats of different academic search engines.

  10. Digital Commons Network

    Open access academic research from top universities . The Digital Commons Network brings together free, full-text scholarly articles from hundreds of universities and colleges worldwide. Curated by university librarians and their supporting institutions, the Network includes a growing collection of peer-reviewed journal articles, book chapters, dissertations, working papers, conference ...

  11. arXiv.org e-Print archive

    arXiv is a free distribution service and an open-access archive for nearly 2.4 million scholarly articles in the fields of physics, mathematics, computer science, quantitative biology, quantitative finance, statistics, electrical engineering and systems science, and economics. Materials on this site are not peer-reviewed by arXiv.

  12. ScienceOpen

    Make an impact and build your research profile in the open with ScienceOpen. Search and discover relevant research in over 95 million Open Access articles and article records; Share your expertise and get credit by publicly reviewing any article; Publish your poster or preprint and track usage and impact with article- and author-level metrics; Create a topical Collection to advance your ...

  13. Open Access Button

    Open Access Button. Make sure your bookmarks bar is showing. If not, you can click View, and select "Show Bookmarks Bar." Drag the Button above to your bookmarks bar. If there is a pop-up, click yes. You're done! The Button is ready to click when you next need it. Give the button a try, or read the instructions

  14. 9 Ways of legally accessing high-quality research articles for free

    Learn how to find and download free scholarly content from various sources, such as open access journals, preprint servers, institutional repositories, Google Scholar, and more. This article also introduces Unpaywall and R Discovery, two tools that help you access paywalled articles without violating copyright laws.

  15. Find and Download Scientific Papers

    Welcome to , a dedicated platform for finding and downloading open access scientific papers and other research data. Our mission is to democratize access to scientific information, making it freely available to researchers, students, and curious minds across the globe. Open Access (OA) refers to the practice of providing unrestricted access via ...

  16. ResearchGate

    Access 160+ million publications and connect with 25+ million researchers. Join for free and gain visibility by uploading your research.

  17. Research Guides: Open Access and Free Scholarly Resources: General

    The Digital Commons Network brings together free, full-text scholarly articles from hundreds of universities and colleges worldwide. Curated by university librarians and their supporting institutions, the Network includes a growing collection of peer-reviewed journal articles, book chapters, dissertations, working papers, conference proceedings, and other original scholarly work.

  18. Sci-Hub: knowledge as a human right

    Sci-Hub is the most controversial project in today science. The goal of Sci-Hub is to provide free and unrestricted access to all scientific knowledge ever published in journal or book form.. Today the circulation of knowledge in science is restricted by high prices. Many students and researchers cannot afford academic journals and books that are locked behind paywalls.

  19. 5 free and legal ways to get the full text of research articles

    5 free and legal ways to get the full text of research articles. By Carol Hollier on 07-Apr-2021 13:23:17. 1. Use your library if you have one! If you are affiliated with a university, you probably have free library access to the full text of millions of research articles. The library will have subscribed to these journals on your behalf.

  20. Academia.edu

    Work faster and smarter with advanced research discovery tools. Search the full text and citations of our millions of papers. Download groups of related papers to jumpstart your research. Save time with detailed summaries and search alerts. Advanced Search. PDF Packages of 37 papers.

  21. How to use Sci-hub to get academic papers for free

    If your country blocks the website, use one of the many free general purpose proxies. I tested hide.me for the purpose of writing this article and it works fine for Sci-hub using the Netherlands exit. 2. Go to the journal publisher's website. Go to the website of whatever article it is you are trying to get.

  22. PaperPanda

    Stop clicking and start reading. Stop navigating paywalls, search engines, and logins. PaperPanda helps you get that full-text PDF faster. Access millions of research paper PDFs in one click on thousands of academic websites. Save time navigating paywalls, logins and redirects. Paper Panda searches the web for PDFs so you don't have to.

  23. Search

    Find the research you need | With 160+ million publications, 1+ million questions, and 25+ million researchers, this is where everyone can access science

  24. Review of Smart-Home Security Using the Internet of Things

    A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the ...

  25. 4,500 students to receive free AI training by end-2025

    Singapore News - More adults and students will have access to free online training in artificial intelligence (AI) and other technology topics over the next year announced global tech company IBM on Aug 23. IBM announced a collaboration with Republic Polytechnic (RP), Singapore Polytechnic... Read more at www.tnp.sg

  26. GLP-1 Agonists and Gastrointestinal Adverse Events

    Glucagon-like peptide 1 (GLP-1) agonists are medications approved for treatment of diabetes that recently have also been used off label for weight loss. 1 Studies have found increased risks of gastrointestinal adverse events (biliary disease, 2 pancreatitis, 3 bowel obstruction, 4 and gastroparesis 5) in patients with diabetes. 2-5 Because such patients have higher baseline risk for ...

  27. Latest T-Mobile News, Offers & Devices

    Mint Mobile Throws AT&T and Verizon Customers a Lifeline: Switch and Bring The Fam for Free. August 22, 2024 | 3 min read. Network Press Release. T-Mobile Readies for Tropical Storm Ernesto to Keep Puerto Rico and the U.S. Virgin Islands Connected. August 13, 2024 | 3 min read.

  28. Style and Grammar Guidelines

    APA Style provides a foundation for effective scholarly communication because it helps writers present their ideas in a clear, concise, and inclusive manner. When style works best, ideas flow logically, sources are credited appropriately, and papers are organized predictably. People are described using language that affirms their worth and dignity.