IoT security: Review, blockchain solutions, and open challenges

MA Khan, K Salah - Future generation computer systems, 2018‏ - Elsevier
With the advent of smart homes, smart cities, and smart everything, the Internet of Things
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …

[HTML][HTML] Survey on security issues in vehicular ad hoc networks

B Mokhtar, M Azab - Alexandria engineering journal, 2015‏ - Elsevier
Abstract Vehicular Ad hoc NETworks are special case of ad hoc networks that, besides
lacking infrastructure, communicating entities move with various accelerations. Accordingly …

ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks

W Li, H Song - IEEE transactions on intelligent transportation …, 2015‏ - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) have the potential to transform the way people travel
through the creation of a safe interoperable wireless communications network that includes …

Secure routing for internet of things: A survey

D Airehrour, J Gutierrez, SK Ray - Journal of Network and Computer …, 2016‏ - Elsevier
Abstract The Internet of Things (IoT) could be described as the pervasive and global network
which aids and provides a system for the monitoring and control of the physical world …

Deep embedded median clustering for routing misbehaviour and attacks detection in ad-hoc networks

A Rajendran, N Balakrishnan, P Ajay - Ad Hoc Networks, 2022‏ - Elsevier
Due to the properties of ad-hoc networks, it appears that designing sophisticated defence
schemes with more computing capital is impossible in most situations. Recently, an …

Object retrieval with large vocabularies and fast spatial matching

J Philbin, O Chum, M Isard, J Sivic… - 2007 IEEE conference …, 2007‏ - ieeexplore.ieee.org
In this paper, we present a large-scale object retrieval system. The user supplies a query
object by selecting a region of a query image, and the system returns a ranked list of images …

Secure routing in wireless sensor networks: Attacks and countermeasures

C Karlof, D Wagner - Ad hoc networks, 2003‏ - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …

Wireless mesh networks: a survey

IF Akyildiz, X Wang, W Wang - Computer networks, 2005‏ - Elsevier
Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh
routers have minimal mobility and form the backbone of WMNs. They provide network …

Securing vehicular ad hoc networks

M Raya, JP Hubaux - Journal of computer security, 2007‏ - content.iospress.com
Vehicular networks are very likely to be deployed in the coming years and thus become the
most relevant form of mobile ad hoc networks. In this paper, we address the security of these …

[کتاب][B] Wireless sensor networks

IF Akyildiz, MC Vuran - 2010‏ - books.google.com
This book presents an in-depth study on the recent advances in Wireless Sensor Networks
(WSNs). The authors describe the existing WSN applications and discuss the research …