Anatomy of threats to the internet of things
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
Game theory meets network security and privacy
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that use game-theoretic approaches. We …
privacy in computer and communication networks that use game-theoretic approaches. We …
Twenty security considerations for cloud-supported Internet of Things
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …
Things”(IoT), it is essential to break down application and technology-based silos and …
[책][B] Network security: A decision and game-theoretic approach
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …
and risk management, this comprehensive work applies unique quantitative models derived …
SpringerBriefs in Computer Science
This is an introduction to multicast routing, which is the study of methods for routing from one
source to many destinations, or from many sources to many destinations. Multicast is …
source to many destinations, or from many sources to many destinations. Multicast is …
Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation
This article is a position paper on the current security issues in Vehicular Ad hoc Networks
(VANETs). VANETs face many interesting research challenges in multiple areas, from …
(VANETs). VANETs face many interesting research challenges in multiple areas, from …
Fast exclusion of errant devices from vehicular networks
T Moore, M Raya, J Clulow… - 2008 5th Annual …, 2008 - ieeexplore.ieee.org
Vehicular networks, in which cars communicate wirelessly to exchange information on traffic
conditions, offer a promising way to improve road safety. Yet ensuring the correct functioning …
conditions, offer a promising way to improve road safety. Yet ensuring the correct functioning …
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use
reputation systems. But in ephemeral networks-a new breed of mobile networks where …
reputation systems. But in ephemeral networks-a new breed of mobile networks where …
Survey on key revocation mechanisms in wireless sensor networks
As sensor nodes are deployed in an open and hostile environment, they are vulnerable to
various attacks. Due to the insecure nature of the environment, it is of critical importance to …
various attacks. Due to the insecure nature of the environment, it is of critical importance to …