IoT security: Review, blockchain solutions, and open challenges

MA Khan, K Salah - Future generation computer systems, 2018 - Elsevier
With the advent of smart homes, smart cities, and smart everything, the Internet of Things
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare

S Saif, P Das, S Biswas, M Khari… - Microprocessors and …, 2022 - Elsevier
This paper presents machine learning and metaheuristic algorithms based hybrid intelligent
Intrusion Detection System (HIIDS) for Internet of Things based applications such as …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …

A survey of intrusion detection systems in wireless sensor networks

I Butun, SD Morgera, R Sankar - IEEE communications surveys …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …

A survey of potential security issues in existing wireless sensor network protocols

I Tomić, JA McCann - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application
domains including critical infrastructure systems, sets an extremely high security bar in the …

Routing attacks and countermeasures in the RPL-based internet of things

L Wallgren, S Raza, T Voigt - International Journal of …, 2013 - journals.sagepub.com
The Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol
standardized for constrained environments such as 6LoWPAN networks. Providing security …

Cybersecurity risk assessment in smart city infrastructures

M Kalinin, V Krundyshev, P Zegzhda - Machines, 2021 - mdpi.com
The article is devoted to cybersecurity risk assessment of the dynamic device-to-device
networks of a smart city. Analysis of the modern security threats at the IoT/IIoT, VANET, and …

Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks

B Bhushan, G Sahoo - Wireless Personal Communications, 2018 - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …

Anomaly detection in wireless sensor networks: A survey

M **e, S Han, B Tian, S Parvin - Journal of Network and computer …, 2011 - Elsevier
Since security threats to WSNs are increasingly being diversified and deliberate, prevention-
based techniques alone can no longer provide WSNs with adequate security. However …