A comprehensive survey of v2x cybersecurity mechanisms and future research paths
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …
existing transport systems by enabling increased connectivity and driving autonomy levels …
A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …
billions of objects. As IoT applications continue to grow, they face several challenges …
A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV
F Sakiz, S Sen - Ad Hoc Networks, 2017 - Elsevier
Vehicular ad hoc networks (VANETs) have become one of the most promising and fastest
growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart …
growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart …
ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks
Vehicular ad hoc networks (VANETs) have the potential to transform the way people travel
through the creation of a safe interoperable wireless communications network that includes …
through the creation of a safe interoperable wireless communications network that includes …
SVELTE: Real-time intrusion detection in the Internet of Things
Abstract In the Internet of Things (IoT), resource-constrained things are connected to the
unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are …
unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are …
A survey of intrusion detection systems in wireless sensor networks
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
Survey on misbehavior detection in cooperative intelligent transportation systems
Cooperative intelligent transportation systems (cITS) are a promising technology to enhance
driving safety and efficiency. Vehicles communicate wirelessly with other vehicles and …
driving safety and efficiency. Vehicles communicate wirelessly with other vehicles and …
Sybil attacks and their defenses in the internet of things
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
Trust management system design for the Internet of Things: A context-aware and multi-service approach
This work proposes a new trust management system (TMS) for the Internet of Things (IoT).
The wide majority of these systems are today bound to the assessment of trustworthiness …
The wide majority of these systems are today bound to the assessment of trustworthiness …
Secure routing in wireless sensor networks: Attacks and countermeasures
C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …
protocols have been proposed, but none of them have been designed with security as a …