Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
A systematic review on clone node detection in static wireless sensor networks
The recent state of the art innovations in technology enables the development of low-cost
sensor nodes with processing and communication capabilities. The unique characteristics of …
sensor nodes with processing and communication capabilities. The unique characteristics of …
Data collection for security measurement in wireless sensor networks: A survey
H **e, Z Yan, Z Yao… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Wireless sensor network (WSN) is an indispensible part of Internet of Things that has been
applied in many fields to monitor environments and collect data from surroundings …
applied in many fields to monitor environments and collect data from surroundings …
A survey on routing protocols supported by the Contiki Internet of things operating system
Standardization and technology advancements have helped the realization of the Internet of
things (IoT). The availability of low-cost IoT devices has also played a key role in furthering …
things (IoT). The availability of low-cost IoT devices has also played a key role in furthering …
Security in wireless ad-hoc networks–a survey
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …
Distributed detection of clone attacks in wireless sensor networks
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an
adversary can physically capture some of the nodes, first can reprogram, and then, can …
adversary can physically capture some of the nodes, first can reprogram, and then, can …
Distributed location and trust based replica detection in wireless sensor networks
As wireless sensor networks (WSNs) are widely used in unattended environments, various
physical attacks are occurred easily. In this paper, location and trust based replica detection …
physical attacks are occurred easily. In this paper, location and trust based replica detection …
Random-walk based approach to detect clone attacks in wireless sensor networks
Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone
attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts …
attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts …
Detecting node replication attacks in wireless sensor networks: a survey
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-
constrained sensor nodes, but is often deployed in unattended and harsh environments to …
constrained sensor nodes, but is often deployed in unattended and harsh environments to …
A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems
With the wide deployment of wireless sensor networks in smart industrial systems, lots of
unauthorized attacking from the adversary are greatly threatening the security and privacy of …
unauthorized attacking from the adversary are greatly threatening the security and privacy of …