Internet of Things (IoT) operating systems support, networking technologies, applications, and challenges: A comparative review

F Javed, MK Afzal, M Sharif… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) has become a reality. As the IoT is now becoming a far more
common field, the demand for IoT technologies to manage the communication of devices …

Programming wireless sensor networks: Fundamental concepts and state of the art

L Mottola, GP Picco - ACM Computing Surveys (CSUR), 2011 - dl.acm.org
Wireless sensor networks (WSNs) are attracting great interest in a number of application
domains concerned with monitoring and control of physical phenomena, as they enable …

Reputation-based framework for high integrity sensor networks

S Ganeriwal, LK Balzano, MB Srivastava - ACM Transactions on Sensor …, 2008 - dl.acm.org
Sensor network technology promises a vast increase in automatic data collection
capabilities through efficient deployment of tiny sensing devices. The technology will allow …

Semantics-aware malware detection

M Christodorescu, S Jha, SA Seshia… - … IEEE symposium on …, 2005 - ieeexplore.ieee.org
A malware detector is a system that attempts to determine whether a program has malicious
intent. In order to evade detection, malware writers (hackers) frequently use obfuscation to …

Multiprogramming a 64kb computer safely and efficiently

A Levy, B Campbell, B Ghena, DB Giffin… - Proceedings of the 26th …, 2017 - dl.acm.org
Low-power microcontrollers lack some of the hardware features and memory resources that
enable multiprogrammable systems. Accordingly, microcontroller-based operating systems …

Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base

J Noorman, P Agten, W Daniels, R Strackx… - 22nd USENIX Security …, 2013 - usenix.org
In this paper we propose Sancus, a security architecture for networked embedded devices.
Sancus supports extensibility in the form of remote (even third-party) software installation on …

Middleware: Middleware challenges and approaches for wireless sensor networks

S Hadim, N Mohamed - IEEE distributed systems online, 2006 - ieeexplore.ieee.org
Using middleware to bridge the gap between applications and low-level constructs is a
novel approach to resolving many wireless sensor network issues and enhancing …

Algorithmic authority: The case of Bitcoin

C Lustig, B Nardi - 2015 48th Hawaii International Conference …, 2015 - ieeexplore.ieee.org
In this paper, we propose a new concept for understanding the role of algorithms in daily life:
algorithmic authority. Algorithmic authority is the legitimate power of algorithms to direct …

Sancus 2.0: A low-cost security architecture for iot devices

J Noorman, JV Bulck, JT Mühlberg, F Piessens… - ACM Transactions on …, 2017 - dl.acm.org
The Sancus security architecture for networked embedded devices was proposed in 2013 at
the USENIX Security conference. It supports remote (even third-party) software installation …

[BOG][B] Green communications: theoretical fundamentals, algorithms and applications

J Wu, S Rangan, H Zhang - 2012 - books.google.com
Nowadays energy crisis and global warming problems are hanging over everyone's head,
urging much research work on energy saving. In the ICT industry, which is becoming a major …