Security of the Internet of Things: perspectives and challenges

Q **g, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
Abstract Internet of Things (IoT) is playing a more and more important role after its showing
up, it covers from traditional equipment to general household objects such as WSNs and …

Vehicular communication: a survey

SK Bhoi, PM Khilar - IET networks, 2014 - Wiley Online Library
Vehicular communication is an important and emerging area of research in the field of
vehicular technology. The development of software and hardware in communication …

[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks

KY Tsao, T Girdler, VG Vassilakis - Ad Hoc Networks, 2022 - Elsevier
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …

Secure routing in wireless sensor networks: Attacks and countermeasures

C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …

Ariadne: A secure on-demand routing protocol for ad hoc networks

YC Hu, A Perrig, DB Johnson - Proceedings of the 8th annual …, 2002 - dl.acm.org
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …

[PDF][PDF] Mobile ad hoc networking: imperatives and challenges

I Chlamtac - Ad Hoc Networks, 2003 - cial.csie.ncku.edu.tw
Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise
wireless mobile nodes that can freely and dynamically self-organize into arbitrary and …

Secure link state routing for mobile ad hoc networks

P Papadimitratos, ZJ Haas - 2003 Symposium on Applications …, 2003 - ieeexplore.ieee.org
Secure operation of the routing protocol is one of the major challenges to be met for the
proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security …

Security in mobile ad hoc networks: challenges and solutions

H Yang, H Luo, F Ye, S Lu… - IEEE wireless …, 2004 - ieeexplore.ieee.org
Security has become a primary concern in order to provide protected communication
between mobile nodes in a hostile environment. Unlike the wireline networks, the unique …

EAACK—a secure intrusion-detection system for MANETs

EM Shakshuki, N Kang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The migration to wireless network from wired network has been a global trend in the past
few decades. The mobility and scalability brought by wireless network made it possible in …

Statistical en-route filtering of injected false data in sensor networks

F Ye, H Luo, S Lu, L Zhang - IEEE Journal on selected areas in …, 2005 - ieeexplore.ieee.org
In a large-scale sensor network individual sensors are subject to security compromises. A
compromised node can be used to inject bogus sensing reports. If undetected, these bogus …