Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

MS Yousefpoor, E Yousefpoor, H Barati, A Barati… - Journal of Network and …, 2021 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which monitor an
environment. These networks have many applications in Internet of Things (IoT) and …

[HTML][HTML] Data aggregation protocols for WSN and IoT applications–A comprehensive survey

BA Begum, SV Nandury - Journal of King Saud University-Computer and …, 2023 - Elsevier
Data aggregation involves the integration of correlated data generated by various wireless
sensors and devices in WSN and IoT networks, in order to arrive at meaningful interpretation …

Seda: Scalable embedded device attestation

N Asokan, F Brasser, A Ibrahim, AR Sadeghi… - Proceedings of the …, 2015 - dl.acm.org
Today, large numbers of smart interconnected devices provide safety and security critical
services for energy grids, industrial control systems, gas and oil search robots, home/office …

Evolving privacy: From sensors to the Internet of Things

J Lopez, R Rios, F Bao, G Wang - Future Generation Computer Systems, 2017 - Elsevier
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …

A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks

E Yousefpoor, H Barati, A Barati - Peer-to-Peer Networking and …, 2021 - Springer
A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered
in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the …

Data aggregation in wireless sensor networks: Previous research, current status and future directions

S Randhawa, S Jain - Wireless Personal Communications, 2017 - Springer
Wireless sensor networks (WSNs) consist of large number of small sized sensor nodes,
whose main task is to sense the desired phenomena in a particular region of interest. These …

IoT security: A layered approach for attacks & defenses

MM Ahemd, MA Shah, A Wahid - 2017 international conference …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) has been a massive advancement in the Information and
Communication Technology (ICT). It is projected that over 50 billion devices will become …

Darpa: Device attestation resilient to physical attacks

A Ibrahim, AR Sadeghi, G Tsudik… - Proceedings of the 9th …, 2016 - dl.acm.org
As embedded devices (under the guise of" smart-whatever") rapidly proliferate into many
domains, they become attractive targets for malware. Protecting them from software and …

Internet of Things backdoors: Resource management issues, security challenges, and detection methods

S Hashemi, M Zarei - Transactions on Emerging …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) technology is one of the successful and interesting products
of ubiquitous wireless networks that beneficiate human life with the make use of smart …

An effective early message ahead join adaptive data aggregation scheme for sustainable IoT

Y Ouyang, A Liu, N **ong… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The rapid development of Internet of Things (IoT) can promote the establishment of the smart
connected world by using numerous devices and sensors. Collecting the data perceived by …