Security and vulnerability of SCADA systems over IP-based wireless sensor networks

HJ Kim - International Journal of Distributed Sensor …, 2012 - journals.sagepub.com
An overview of supervisory control and data acquisition (SCADA) systems is presented and
relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to …

A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities

O AbuAlghanam, M Qatawneh, W Almobaideen… - Journal of Information …, 2022 - Elsevier
Abstract The Internet of Things (IoT) is a system of objects such as traditional computers,
cameras, sensors and other things that are interconnected via a network to gather, process …

Real time MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information

A Shahzad, M Lee, YK Lee, S Kim, N **ong, JY Choi… - Symmetry, 2015 - mdpi.com
Information technology (IT) security has become a major concern due to the growing
demand for information and massive development of client/server applications for various …

Dynamic and secure key management model for hierarchical heterogeneous sensor networks

MR Alagheband, MR Aref - IET Information Security, 2012 - IET
Many applications that utilise wireless sensor networks (WSNs) require essentially secure
communication. However, WSNs suffer from some inherent weaknesses because of …

Security analysis survey and framework design for ip connected lowpans

R Riaz, KH Kim, HF Ahmed - 2009 international symposium on …, 2009 - ieeexplore.ieee.org
IEEE 802.15. 4 standard for low power wireless personal area networks (LoWPANs) is
emerging as a promising technology to bring envisioned ubiquitous paragon, into …

A distributed approach for secure M2M communications

YB Saied, A Olivereau, M Laurent - 2012 5th International …, 2012 - ieeexplore.ieee.org
A key establishment solution for heterogeneous Machine to Machine (M2M)
communications is proposed. Decentralization in M2M environment leads to situations …

A decade of security research in ubiquitous computing: results of a systematic literature review

E Kusen, M Strembeck - International Journal of Pervasive Computing …, 2016 - emerald.com
Purpose Ever since Mark Weiser coined the term “ubiquitous computing”(ubicomp) in 1988,
there has been a general interest in proposing various solutions that would support his …

Enabling end-to-end secure communication between wireless sensor networks and the Internet

H Yu, J He, T Zhang, P **ao, Y Zhang - World Wide Web, 2013 - Springer
In the paradigms of the Internet of Things (IoT) as well as the evolving Web of Things (WoT)
and the emerging Wisdom Web of Things (W2T), not only can the data collected by the …

A PKI adapted model for secure information dissemination in industrial control and automation 6LoWPANs

S Misra, S Goswami, C Taneja, A Mukherjee… - IEEE …, 2015 - ieeexplore.ieee.org
Wireless sensor nodes have a wide span of applications ranging from industrial monitoring
to military operations. These nodes are highly constrained in terms of battery life, processing …

An efficient pairwise and group key management protocol for wireless sensor network

M Rahman, S Sampalli - Wireless Personal Communications, 2015 - Springer
Although security services depend on the key management system, they do not specify how
to exchange keys securely. Many security-critical applications depend on key management …