Robustness, security and privacy in location-based services for future IoT: A survey
Internet of Things (IoT) connects sensing devices to the Internet for the purpose of
exchanging information. Location information is one of the most crucial pieces of information …
exchanging information. Location information is one of the most crucial pieces of information …
Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions
Vehicular networking has significant potential to enable diverse applications associated with
traffic safety, traffic efficiency and infotainment. In this survey and tutorial paper we introduce …
traffic safety, traffic efficiency and infotainment. In this survey and tutorial paper we introduce …
The sybil attack in sensor networks: analysis & defenses
Security is important for many sensor network applications. A particularly harmful attack
against sensor and ad hoc networks is known as the Sybil attack [6], where a node …
against sensor and ad hoc networks is known as the Sybil attack [6], where a node …
Establishing pairwise keys in distributed sensor networks
D Liu, P Ning, R Li - ACM Transactions on Information and System …, 2005 - dl.acm.org
Pairwise key establishment is a fundamental security service in sensor networks; it enables
sensor nodes to communicate securely with each other using cryptographic techniques …
sensor nodes to communicate securely with each other using cryptographic techniques …
[PDF][PDF] Relay attacks on passive keyless entry and start systems in modern cars
We demonstrate relay attacks on Passive Keyless Entry and Start (PKES) systems used in
modern cars. We build two efficient and inexpensive attack realizations, wired and wireless …
modern cars. We build two efficient and inexpensive attack realizations, wired and wireless …
Quantum cryptography beyond quantum key distribution
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …
order to perform cryptographic tasks. While the most well-known example of this discipline is …
Sybilguard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …
vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities …
Sensor network security: a survey
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …
collect, and disseminate information in many types of applications. As sensor networks …
[HTML][HTML] Management and applications of trust in Wireless Sensor Networks: A survey
Abstract Wireless Sensors Networks (WSNs) are susceptible to many security threats, and
because of communication, computation and delay constraints of WSNs, traditional security …
because of communication, computation and delay constraints of WSNs, traditional security …
Wireless sensor network security: A survey
368As wireless sensor networks continue to grow, so does the need for effective security
mechanisms. Because sensor networks may interact with sensitive data and/or operate in …
mechanisms. Because sensor networks may interact with sensitive data and/or operate in …