Internet of Things (IoT) cybersecurity research: A review of current research topics

Y Lu, L Da Xu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As an emerging technology, the Internet of Things (IoT) revolutionized the global network
comprising of people, smart devices, intelligent objects, data, and information. The …

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

A New Level Intrusion Detection System for Node Level Drop Attacks in Wireless Sensor Network

K Madhuri - Journal of Algebraic Statistics, 2022 - publishoa.com
Recently, wireless sensor networks (WSNs) have received much attention by researchers
because of their lower cost of deployment and easier to use. These networks are more …

Secure signature-based authenticated key establishment scheme for future IoT applications

S Challa, M Wazid, AK Das, N Kumar, AG Reddy… - Ieee …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet.
These devices can be remotely accessed and controlled using existing network …

A survey on successors of LEACH protocol

SK Singh, P Kumar, JP Singh - Ieee Access, 2017 - ieeexplore.ieee.org
Even after 16 years of existence, low energy adaptive clustering hierarchy (LEACH) protocol
is still gaining the attention of the research community working in the area of wireless sensor …

Security of the Internet of Things: perspectives and challenges

Q **g, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
Abstract Internet of Things (IoT) is playing a more and more important role after its showing
up, it covers from traditional equipment to general household objects such as WSNs and …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

PhaseBeat: Exploiting CSI phase data for vital sign monitoring with commodity WiFi devices

X Wang, C Yang, S Mao - 2017 IEEE 37th international …, 2017 - ieeexplore.ieee.org
Vital signs, such as respiration and heartbeat, are useful to health monitoring since such
signals provide important clues of medical conditions. Effective solutions are needed to …

IoT technologies<? show [AQ ID= Q1]?> for smart cities

B Hammi, R Khatoun, S Zeadally, A Fayad… - IET …, 2018 - Wiley Online Library
The large deployment of Internet of things (IoT) is actually enabling smart city projects and
initiatives all over the world. Objects used in daily life are being equipped with electronic …

Cyber security in new space: Analysis of threats, key enabling technologies and challenges

M Manulis, CP Bridges, R Harrison, V Sekar… - International Journal of …, 2021 - Springer
Developments in technologies, attitudes and investment are transforming the space
environment, achieving greater accessibility for an increasing number of parties. New and …