IoT security: Review, blockchain solutions, and open challenges

MA Khan, K Salah - Future generation computer systems, 2018 - Elsevier
With the advent of smart homes, smart cities, and smart everything, the Internet of Things
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

A survey of intrusion detection systems in wireless sensor networks

I Butun, SD Morgera, R Sankar - IEEE communications surveys …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …

Routing attacks and countermeasures in the RPL-based internet of things

L Wallgren, S Raza, T Voigt - International Journal of …, 2013 - journals.sagepub.com
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol
standardized for constrained environments such as 6LoWPAN networks. Providing security …

A survey of potential security issues in existing wireless sensor network protocols

I Tomić, JA McCann - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application
domains including critical infrastructure systems, sets an extremely high security bar in the …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …

HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare

S Saif, P Das, S Biswas, M Khari… - Microprocessors and …, 2022 - Elsevier
This paper presents machine learning and metaheuristic algorithms based hybrid intelligent
Intrusion Detection System (HIIDS) for Internet of Things based applications such as …

Cybersecurity risk assessment in smart city infrastructures

M Kalinin, V Krundyshev, P Zegzhda - Machines, 2021 - mdpi.com
The article is devoted to cybersecurity risk assessment of the dynamic device-to-device
networks of a smart city. Analysis of the modern security threats at the IoT/IIoT, VANET, and …

Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks

B Bhushan, G Sahoo - Wireless Personal Communications, 2018 - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …

Node replication attack detection in distributed wireless sensor networks

L Sujihelen, R Boddu, S Murugaveni… - Wireless …, 2022 - Wiley Online Library
Wireless sensor network (WSN) is an emerging technology used in emergency scenarios.
There are a number of possible threats to WSNs because they use unsupervised IP …