A survey of potential security issues in existing wireless sensor network protocols

I Tomić, JA McCann - IEEE Internet of Things Journal, 2017‏ - ieeexplore.ieee.org
The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application
domains including critical infrastructure systems, sets an extremely high security bar in the …

An instrumentation engineer's review on smart grid: Critical applications and parameters

J Bhatt, V Shah, O Jani - Renewable and Sustainable Energy Reviews, 2014‏ - Elsevier
Conventional electrical grid is transforming into smart grid—an evolutionary solution to
satisfy rapidly emerging and vibrantly changing requirements of utilities and customers by …

[HTML][HTML] A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues

G Sharma, S Vidalis, N Anand, C Menon, S Kumar - Electronics, 2021‏ - mdpi.com
Security is a mandatory issue in any network, where sensitive data are transferred safely in
the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile …

6LowPSec: An end-to-end security protocol for 6LoWPAN

G Glissa, A Meddeb - Ad Hoc Networks, 2019‏ - Elsevier
Abstract 6LoWPAN has radically changed the IoT (Internet of Things) landscape by seeking
to extend the use of IPv6 to smart and tiny objects. Enabling efficient IPv6 communication …

Energy efficient cross-layer approach for object security of CoAP for IoT devices

RH Randhawa, A Hameed, AN Mian - Ad Hoc Networks, 2019‏ - Elsevier
CoAP is an application layer protocol designed for resource-constrained devices in Internet-
of-Things (IoT). Object Security of CoAP (OSCoAP) is an IETF draft for addressing security …

Security and privacy issues in smart healthcare system using internet of things

R Nidhya, M Kumar, R Maheswar… - IoT‐Enabled Smart …, 2022‏ - Wiley Online Library
The rapid advancement in Internet of Things (IoT) associated with biosensors provides many
benefits to the humans, such as smart healthcare systems (SHS). SHS offer plenty of …

Evaluating and improving the scalability of RPL security in the Internet of Things

A Arena, P Perazzo, C Vallati, G Dini… - Computer …, 2020‏ - Elsevier
Abstract Wireless Sensor and Actuator Networks (WSANs) will represent a key building
block for the future Internet of Things, as a cheap and easily-deployable technology to …

Security architectures in wireless sensor network

V Bhasin, S Kumar, PC Saxena, CP Katti - International Journal of …, 2020‏ - Springer
Sensor networks are an apt amalgamation of sensing, processing and communication.
These networks are formed using tiny inexpensive sensor nodes which have the attributes of …

JAMMY: A distributed and dynamic solution to selective jamming attack in TDMA WSNs

M Tiloca, D De Guglielmo, G Dini… - … on Dependable and …, 2015‏ - ieeexplore.ieee.org
Time division multiple access (TDMA) is often used in wireless sensor networks (WSNs),
especially for critical applications, as it provides high energy efficiency, guaranteed …

DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15. 4e TSCH networks

M Tiloca, DD Guglielmo, G Dini, G Anastasi… - ACM Transactions on …, 2018‏ - dl.acm.org
The MAC standard amendment IEEE 802.15. 4e is designed to meet the requirements of
industrial and critical applications. In particular, the Time Slotted Channel Hop** (TSCH) …