Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

A systematic review on clone node detection in static wireless sensor networks

M Numan, F Subhan, WZ Khan, S Hakak… - IEEE …, 2020 - ieeexplore.ieee.org
The recent state of the art innovations in technology enables the development of low-cost
sensor nodes with processing and communication capabilities. The unique characteristics of …

Data collection for security measurement in wireless sensor networks: A survey

H **e, Z Yan, Z Yao… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Wireless sensor network (WSN) is an indispensible part of Internet of Things that has been
applied in many fields to monitor environments and collect data from surroundings …

A survey on routing protocols supported by the Contiki Internet of things operating system

YB Zikria, MK Afzal, F Ishmanov, SW Kim… - Future Generation …, 2018 - Elsevier
Standardization and technology advancements have helped the realization of the Internet of
things (IoT). The availability of low-cost IoT devices has also played a key role in furthering …

Security in wireless ad-hoc networks–a survey

R Di Pietro, S Guarino, NV Verde… - Computer …, 2014 - Elsevier
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …

Distributed detection of clone attacks in wireless sensor networks

M Conti, R Di Pietro, L Mancini… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an
adversary can physically capture some of the nodes, first can reprogram, and then, can …

Distributed location and trust based replica detection in wireless sensor networks

G Amudha, P Narayanasamy - Wireless Personal Communications, 2018 - Springer
As wireless sensor networks (WSNs) are widely used in unattended environments, various
physical attacks are occurred easily. In this paper, location and trust based replica detection …

Random-walk based approach to detect clone attacks in wireless sensor networks

Y Zeng, J Cao, S Zhang, S Guo… - IEEE Journal on selected …, 2010 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone
attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts …

Detecting node replication attacks in wireless sensor networks: a survey

WT Zhu, J Zhou, RH Deng, F Bao - Journal of Network and Computer …, 2012 - Elsevier
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-
constrained sensor nodes, but is often deployed in unattended and harsh environments to …

A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems

L Li, G Xu, L Jiao, X Li, H Wang, J Hu… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
With the wide deployment of wireless sensor networks in smart industrial systems, lots of
unauthorized attacking from the adversary are greatly threatening the security and privacy of …