Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

A survey of network-on-chip security attacks and countermeasures

S Charles, P Mishra - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
With the advances of chip manufacturing technologies, computer architects have been able
to integrate an increasing number of processors and other heterogeneous components on …

[PDF][PDF] Towards intrusion detection in wireless sensor networks

I Krontiris, T Dimitriou, FC Freiling - proceedings of the 13th …, 2007 - academia.edu
Detection is sensor networks and we propose a lightweight scheme that can be applied to
such networks. Its basic characteristic is that nodes monitor their neighborhood and …

AVEXIS—Aqua vehicle explorer for in-situ sensing

A Griffiths, A Dikarev, PR Green… - IEEE Robotics and …, 2016 - ieeexplore.ieee.org
The AVEXIS (aqua vehicle explorer for in-situ sensing) underwater vehicles have been
developed to allow characterization and monitoring of hazardous underwater environments …

Cross layer intrusion detection system for wireless sensor network

DE Boubiche, A Bilami - … Journal of Network Security & Its …, 2012 - search.proquest.com
The wireless sensor networks (WSN) are particularly vulnerable to various attacks at
different layers of the protocol stack. Many intrusion detection system (IDS) have been …

Toward trust based protocols in a pervasive and mobile computing environment: A survey

AB Usman, J Gutierrez - Ad Hoc Networks, 2018 - Elsevier
In the blooming era of Pervasive and Mobile Computing, trust has been accepted as a vital
factor for provisioning secure, reliable and seamless communications between pervasive …

On the IEEE 802.15. 4 MAC layer attacks: GTS attack

R Sokullu, O Dagdeviren… - 2008 Second international …, 2008 - ieeexplore.ieee.org
In the last several years IEEE 802.15. 4 has been accepted as a major MAC layer protocol
for wireless sensor networks (WSNs) and has attracted the interest of there search …

Wireless Sensor Network attacks: An overview and critical analysis

A Tayebi, S Berber, A Swain - 2013 Seventh international …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) are gaining a lot of attention from researchers due to their
massive applications. Network security is one of the important requirements of those …

Analysis of the adaptive filter algorithm for feedback-type active noise control

H Sakai, S Miyagi - Signal processing, 2003 - Elsevier
The feedback-type active noise control (ANC) system uses only one microphone to provide
necessary signals for adjusting the adaptive filter. Due to the complicated nature of the …

Confidential and secure broadcast in wireless sensor networks

J Shaheen, D Ostry, V Sivaraman… - 2007 IEEE 18th …, 2007 - ieeexplore.ieee.org
Wireless sensor networks need broadcast for operations such as software updates, network
queries, and command dissemination. Alongside ensuring authenticity of the source and …