Security of the Internet of Things: perspectives and challenges
Abstract Internet of Things (IoT) is playing a more and more important role after its showing
up, it covers from traditional equipment to general household objects such as WSNs and …
up, it covers from traditional equipment to general household objects such as WSNs and …
Vehicular communication: a survey
Vehicular communication is an important and emerging area of research in the field of
vehicular technology. The development of software and hardware in communication …
vehicular technology. The development of software and hardware in communication …
[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …
Secure routing in wireless sensor networks: Attacks and countermeasures
C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …
protocols have been proposed, but none of them have been designed with security as a …
Ariadne: A secure on-demand routing protocol for ad hoc networks
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …
[PDF][PDF] Mobile ad hoc networking: imperatives and challenges
I Chlamtac - Ad Hoc Networks, 2003 - cial.csie.ncku.edu.tw
Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise
wireless mobile nodes that can freely and dynamically self-organize into arbitrary and …
wireless mobile nodes that can freely and dynamically self-organize into arbitrary and …
Secure link state routing for mobile ad hoc networks
Secure operation of the routing protocol is one of the major challenges to be met for the
proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security …
proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security …
Security in mobile ad hoc networks: challenges and solutions
Security has become a primary concern in order to provide protected communication
between mobile nodes in a hostile environment. Unlike the wireline networks, the unique …
between mobile nodes in a hostile environment. Unlike the wireline networks, the unique …
EAACK—a secure intrusion-detection system for MANETs
EM Shakshuki, N Kang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The migration to wireless network from wired network has been a global trend in the past
few decades. The mobility and scalability brought by wireless network made it possible in …
few decades. The mobility and scalability brought by wireless network made it possible in …
Statistical en-route filtering of injected false data in sensor networks
In a large-scale sensor network individual sensors are subject to security compromises. A
compromised node can be used to inject bogus sensing reports. If undetected, these bogus …
compromised node can be used to inject bogus sensing reports. If undetected, these bogus …