Security and vulnerability of SCADA systems over IP-based wireless sensor networks
HJ Kim - International Journal of Distributed Sensor …, 2012 - journals.sagepub.com
An overview of supervisory control and data acquisition (SCADA) systems is presented and
relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to …
relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to …
A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities
Abstract The Internet of Things (IoT) is a system of objects such as traditional computers,
cameras, sensors and other things that are interconnected via a network to gather, process …
cameras, sensors and other things that are interconnected via a network to gather, process …
Real time MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information
Information technology (IT) security has become a major concern due to the growing
demand for information and massive development of client/server applications for various …
demand for information and massive development of client/server applications for various …
Dynamic and secure key management model for hierarchical heterogeneous sensor networks
Many applications that utilise wireless sensor networks (WSNs) require essentially secure
communication. However, WSNs suffer from some inherent weaknesses because of …
communication. However, WSNs suffer from some inherent weaknesses because of …
Security analysis survey and framework design for ip connected lowpans
IEEE 802.15. 4 standard for low power wireless personal area networks (LoWPANs) is
emerging as a promising technology to bring envisioned ubiquitous paragon, into …
emerging as a promising technology to bring envisioned ubiquitous paragon, into …
A distributed approach for secure M2M communications
A key establishment solution for heterogeneous Machine to Machine (M2M)
communications is proposed. Decentralization in M2M environment leads to situations …
communications is proposed. Decentralization in M2M environment leads to situations …
A decade of security research in ubiquitous computing: results of a systematic literature review
Purpose Ever since Mark Weiser coined the term “ubiquitous computing”(ubicomp) in 1988,
there has been a general interest in proposing various solutions that would support his …
there has been a general interest in proposing various solutions that would support his …
Enabling end-to-end secure communication between wireless sensor networks and the Internet
H Yu, J He, T Zhang, P **ao, Y Zhang - World Wide Web, 2013 - Springer
In the paradigms of the Internet of Things (IoT) as well as the evolving Web of Things (WoT)
and the emerging Wisdom Web of Things (W2T), not only can the data collected by the …
and the emerging Wisdom Web of Things (W2T), not only can the data collected by the …
A PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs
Wireless sensor nodes have a wide span of applications ranging from industrial monitoring
to military operations. These nodes are highly constrained in terms of battery life, processing …
to military operations. These nodes are highly constrained in terms of battery life, processing …
An efficient pairwise and group key management protocol for wireless sensor network
M Rahman, S Sampalli - Wireless Personal Communications, 2015 - Springer
Although security services depend on the key management system, they do not specify how
to exchange keys securely. Many security-critical applications depend on key management …
to exchange keys securely. Many security-critical applications depend on key management …