Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

Game theory meets network security and privacy

MH Manshaei, Q Zhu, T Alpcan, T Bacşar… - ACM Computing …, 2013 - dl.acm.org
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that use game-theoretic approaches. We …

Twenty security considerations for cloud-supported Internet of Things

J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …

[책][B] Network security: A decision and game-theoretic approach

T Alpcan, T Başar - 2010 - books.google.com
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …

SpringerBriefs in Computer Science

S Zdonik, P Ning, S Shekhar, J Katz, X Wu, LC Jain… - 2012 - Springer
This is an introduction to multicast routing, which is the study of methods for routing from one
source to many destinations, or from many sources to many destinations. Multicast is …

Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation

DA Rivas, JM Barceló-Ordinas, MG Zapata… - Journal of Network and …, 2011 - Elsevier
This article is a position paper on the current security issues in Vehicular Ad hoc Networks
(VANETs). VANETs face many interesting research challenges in multiple areas, from …

[책][B] Computer network security

J Wang - 2009 - Springer
People today are mcreasmgly relymg on pubhc computer networks to conduct bUSI-ness
and take care of household needs. However, public networks may be insecure because …

Fast exclusion of errant devices from vehicular networks

T Moore, M Raya, J Clulow… - 2008 5th Annual …, 2008 - ieeexplore.ieee.org
Vehicular networks, in which cars communicate wirelessly to exchange information on traffic
conditions, offer a promising way to improve road safety. Yet ensuring the correct functioning …

Revocation games in ephemeral networks

M Raya, MH Manshaei, M Félegyházi… - Proceedings of the 15th …, 2008 - dl.acm.org
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use
reputation systems. But in ephemeral networks-a new breed of mobile networks where …

Survey on key revocation mechanisms in wireless sensor networks

M Ge, KKR Choo, H Wu, Y Yu - Journal of Network and Computer …, 2016 - Elsevier
As sensor nodes are deployed in an open and hostile environment, they are vulnerable to
various attacks. Due to the insecure nature of the environment, it is of critical importance to …