Internet of things: Security and solutions survey
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …
each aspect of everyday living is creating a promising prospect for the involvement of …
A survey of network-on-chip security attacks and countermeasures
With the advances of chip manufacturing technologies, computer architects have been able
to integrate an increasing number of processors and other heterogeneous components on …
to integrate an increasing number of processors and other heterogeneous components on …
[PDF][PDF] Towards intrusion detection in wireless sensor networks
Detection is sensor networks and we propose a lightweight scheme that can be applied to
such networks. Its basic characteristic is that nodes monitor their neighborhood and …
such networks. Its basic characteristic is that nodes monitor their neighborhood and …
AVEXIS—Aqua vehicle explorer for in-situ sensing
The AVEXIS (aqua vehicle explorer for in-situ sensing) underwater vehicles have been
developed to allow characterization and monitoring of hazardous underwater environments …
developed to allow characterization and monitoring of hazardous underwater environments …
Cross layer intrusion detection system for wireless sensor network
The wireless sensor networks (WSN) are particularly vulnerable to various attacks at
different layers of the protocol stack. Many intrusion detection system (IDS) have been …
different layers of the protocol stack. Many intrusion detection system (IDS) have been …
Toward trust based protocols in a pervasive and mobile computing environment: A survey
In the blooming era of Pervasive and Mobile Computing, trust has been accepted as a vital
factor for provisioning secure, reliable and seamless communications between pervasive …
factor for provisioning secure, reliable and seamless communications between pervasive …
On the IEEE 802.15. 4 MAC layer attacks: GTS attack
In the last several years IEEE 802.15. 4 has been accepted as a major MAC layer protocol
for wireless sensor networks (WSNs) and has attracted the interest of there search …
for wireless sensor networks (WSNs) and has attracted the interest of there search …
Wireless Sensor Network attacks: An overview and critical analysis
Wireless Sensor Networks (WSN) are gaining a lot of attention from researchers due to their
massive applications. Network security is one of the important requirements of those …
massive applications. Network security is one of the important requirements of those …
Analysis of the adaptive filter algorithm for feedback-type active noise control
H Sakai, S Miyagi - Signal processing, 2003 - Elsevier
The feedback-type active noise control (ANC) system uses only one microphone to provide
necessary signals for adjusting the adaptive filter. Due to the complicated nature of the …
necessary signals for adjusting the adaptive filter. Due to the complicated nature of the …
Confidential and secure broadcast in wireless sensor networks
J Shaheen, D Ostry, V Sivaraman… - 2007 IEEE 18th …, 2007 - ieeexplore.ieee.org
Wireless sensor networks need broadcast for operations such as software updates, network
queries, and command dissemination. Alongside ensuring authenticity of the source and …
queries, and command dissemination. Alongside ensuring authenticity of the source and …