Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review
Wireless sensor networks include a large number of sensor nodes, which monitor an
environment. These networks have many applications in Internet of Things (IoT) and …
environment. These networks have many applications in Internet of Things (IoT) and …
[HTML][HTML] Data aggregation protocols for WSN and IoT applications–A comprehensive survey
BA Begum, SV Nandury - Journal of King Saud University-Computer and …, 2023 - Elsevier
Data aggregation involves the integration of correlated data generated by various wireless
sensors and devices in WSN and IoT networks, in order to arrive at meaningful interpretation …
sensors and devices in WSN and IoT networks, in order to arrive at meaningful interpretation …
Seda: Scalable embedded device attestation
Today, large numbers of smart interconnected devices provide safety and security critical
services for energy grids, industrial control systems, gas and oil search robots, home/office …
services for energy grids, industrial control systems, gas and oil search robots, home/office …
Evolving privacy: From sensors to the Internet of Things
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …
interacting things capable of offering all sorts of services to near and remote entities. The …
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered
in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the …
in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the …
Data aggregation in wireless sensor networks: Previous research, current status and future directions
S Randhawa, S Jain - Wireless Personal Communications, 2017 - Springer
Wireless sensor networks (WSNs) consist of large number of small sized sensor nodes,
whose main task is to sense the desired phenomena in a particular region of interest. These …
whose main task is to sense the desired phenomena in a particular region of interest. These …
IoT security: A layered approach for attacks & defenses
Internet of Things (IoT) has been a massive advancement in the Information and
Communication Technology (ICT). It is projected that over 50 billion devices will become …
Communication Technology (ICT). It is projected that over 50 billion devices will become …
Darpa: Device attestation resilient to physical attacks
As embedded devices (under the guise of" smart-whatever") rapidly proliferate into many
domains, they become attractive targets for malware. Protecting them from software and …
domains, they become attractive targets for malware. Protecting them from software and …
Internet of Things backdoors: Resource management issues, security challenges, and detection methods
Abstract Internet of Things (IoT) technology is one of the successful and interesting products
of ubiquitous wireless networks that beneficiate human life with the make use of smart …
of ubiquitous wireless networks that beneficiate human life with the make use of smart …
An effective early message ahead join adaptive data aggregation scheme for sustainable IoT
The rapid development of Internet of Things (IoT) can promote the establishment of the smart
connected world by using numerous devices and sensors. Collecting the data perceived by …
connected world by using numerous devices and sensors. Collecting the data perceived by …