Robustness, security and privacy in location-based services for future IoT: A survey

L Chen, S Thombre, K Järvinen, ES Lohan… - Ieee …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) connects sensing devices to the Internet for the purpose of
exchanging information. Location information is one of the most crucial pieces of information …

Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions

G Karagiannis, O Altintas, E Ekici… - … surveys & tutorials, 2011 - ieeexplore.ieee.org
Vehicular networking has significant potential to enable diverse applications associated with
traffic safety, traffic efficiency and infotainment. In this survey and tutorial paper we introduce …

The sybil attack in sensor networks: analysis & defenses

J Newsome, E Shi, D Song, A Perrig - Proceedings of the 3rd …, 2004 - dl.acm.org
Security is important for many sensor network applications. A particularly harmful attack
against sensor and ad hoc networks is known as the Sybil attack [6], where a node …

Establishing pairwise keys in distributed sensor networks

D Liu, P Ning, R Li - ACM Transactions on Information and System …, 2005 - dl.acm.org
Pairwise key establishment is a fundamental security service in sensor networks; it enables
sensor nodes to communicate securely with each other using cryptographic techniques …

[PDF][PDF] Relay attacks on passive keyless entry and start systems in modern cars

A Francillon, B Danev… - Proceedings of the …, 2011 - research-collection.ethz.ch
We demonstrate relay attacks on Passive Keyless Entry and Start (PKES) systems used in
modern cars. We build two efficient and inexpensive attack realizations, wired and wireless …

Quantum cryptography beyond quantum key distribution

A Broadbent, C Schaffner - Designs, Codes and Cryptography, 2016 - Springer
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …

Sybilguard: defending against sybil attacks via social networks

H Yu, M Kaminsky, PB Gibbons… - Proceedings of the 2006 …, 2006 - dl.acm.org
Peer-to-peer and other decentralized, distributed systems are known to be particularly
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …

Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

[HTML][HTML] Management and applications of trust in Wireless Sensor Networks: A survey

G Han, J Jiang, L Shu, J Niu, HC Chao - Journal of Computer and System …, 2014 - Elsevier
Abstract Wireless Sensors Networks (WSNs) are susceptible to many security threats, and
because of communication, computation and delay constraints of WSNs, traditional security …

Wireless sensor network security: A survey

JP Walters, Z Liang, W Shi… - Security in distributed, grid …, 2007 - taylorfrancis.com
368As wireless sensor networks continue to grow, so does the need for effective security
mechanisms. Because sensor networks may interact with sensitive data and/or operate in …