Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009‏ - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

Security issues of mobile ad hoc and sensor networks

D Djenouri, L Khelladi, N Badache - 2005‏ - dl.cerist.dz
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability
of wireless links, the limited physical protection of nodes, the dynamically changing …

SIT: a lightweight encryption algorithm for secure internet of things

M Usman, I Ahmed, MI Aslam, S Khan… - ar**_files/store-EN-1520500332-7975.pdf" data-clk="hl=iw&sa=T&oi=gga&ct=gga&cd=8&d=17767274080237345614&ei=jiXGZ8-jJtWUieoPn7TdmQw" data-clk-atid="TluNE6QJkvYJ" target="_blank">[PDF] faratarjome.ir

VeRA-version number and rank authentication in RPL

A Dvir, L Buttyan - … international conference on mobile ad-hoc …, 2011‏ - ieeexplore.ieee.org
Designing a routing protocol for large low-power and lossy networks (LLNs), consisting of
thousands of constrained nodes and unreliable links, presents new challenges. The IPv6 …

Secure remote state estimation against linear man-in-the-middle attacks using watermarking

J Huang, DWC Ho, F Li, W Yang, Y Tang - Automatica, 2020‏ - Elsevier
In this paper, an attack defense method is proposed to address the secure remote state
estimation problem caused by linear man-in-the-middle attacks in cyber–physical systems …