IoT security: Review, blockchain solutions, and open challenges
MA Khan, K Salah - Future generation computer systems, 2018 - Elsevier
With the advent of smart homes, smart cities, and smart everything, the Internet of Things
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
A survey of intrusion detection systems in wireless sensor networks
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
Routing attacks and countermeasures in the RPL-based internet of things
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol
standardized for constrained environments such as 6LoWPAN networks. Providing security …
standardized for constrained environments such as 6LoWPAN networks. Providing security …
A survey of potential security issues in existing wireless sensor network protocols
The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application
domains including critical infrastructure systems, sets an extremely high security bar in the …
domains including critical infrastructure systems, sets an extremely high security bar in the …
Perception layer security in Internet of Things
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …
largely attracted both the industry and the academia. Life without the IoT is entirely …
HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare
This paper presents machine learning and metaheuristic algorithms based hybrid intelligent
Intrusion Detection System (HIIDS) for Internet of Things based applications such as …
Intrusion Detection System (HIIDS) for Internet of Things based applications such as …
Cybersecurity risk assessment in smart city infrastructures
The article is devoted to cybersecurity risk assessment of the dynamic device-to-device
networks of a smart city. Analysis of the modern security threats at the IoT/IIoT, VANET, and …
networks of a smart city. Analysis of the modern security threats at the IoT/IIoT, VANET, and …
Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks
B Bhushan, G Sahoo - Wireless Personal Communications, 2018 - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …
mechanical devices and information processing technologies enabled the development of …
Node replication attack detection in distributed wireless sensor networks
Wireless sensor network (WSN) is an emerging technology used in emergency scenarios.
There are a number of possible threats to WSNs because they use unsupervised IP …
There are a number of possible threats to WSNs because they use unsupervised IP …