Robustness, security and privacy in location-based services for future IoT: A survey

L Chen, S Thombre, K Järvinen, ES Lohan… - Ieee …, 2017‏ - ieeexplore.ieee.org
Internet of Things (IoT) connects sensing devices to the Internet for the purpose of
exchanging information. Location information is one of the most crucial pieces of information …

[HTML][HTML] Survey on security issues in vehicular ad hoc networks

B Mokhtar, M Azab - Alexandria engineering journal, 2015‏ - Elsevier
Abstract Vehicular Ad hoc NETworks are special case of ad hoc networks that, besides
lacking infrastructure, communicating entities move with various accelerations. Accordingly …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019‏ - Elsevier
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …

[PDF][PDF] Relay attacks on passive keyless entry and start systems in modern cars

A Francillon, B Danev… - Proceedings of the …, 2011‏ - research-collection.ethz.ch
We demonstrate relay attacks on Passive Keyless Entry and Start (PKES) systems used in
modern cars. We build two efficient and inexpensive attack realizations, wired and wireless …

The security and privacy of smart vehicles

JP Hubaux, S Capkun, J Luo - IEEE Security & Privacy, 2004‏ - ieeexplore.ieee.org
The security and privacy of smart vehicles Page 1 Making Wireless Work Current traffic-safety
statistics are notoriously horrific. Approximately 40,000 people are killed each year on the …

Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks

B Bhushan, G Sahoo - Wireless Personal Communications, 2018‏ - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …

A survey of attacks and countermeasures in mobile ad hoc networks

B Wu, J Chen, J Wu, M Cardei - Wireless network security, 2007‏ - Springer
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …

On securing underwater acoustic networks: A survey

S Jiang - IEEE Communications Surveys & Tutorials, 2018‏ - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …

Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism

SY Kuo, FH Tseng, YH Chou - Future Generation Computer Systems, 2023‏ - Elsevier
The Metaverse shows great potential to facilitate the development of new technologies.
Because the security of the Metaverse has attracted considerable attention, the automatic …

[کتاب][B] Vehicular networking

C Sommer, F Dressler - 2015‏ - books.google.com
With this essential guide to vehicular networking, you will learn about everything from
conceptual approaches and state-of-the-art protocols, to system designs and their …