Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …
Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …
A comprehensive study of security of internet-of-things
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …
transformative approach for providing numerous services. Compact smart devices constitute …
GPSR: Greedy perimeter stateless routing for wireless networks
We present Greedy Perimeter Stateless Routing (GPSR), a novel routing protocol for
wireless datagram networks that uses the positions of routers and a packet's destination to …
wireless datagram networks that uses the positions of routers and a packet's destination to …
Secure routing in wireless sensor networks: Attacks and countermeasures
C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …
protocols have been proposed, but none of them have been designed with security as a …
SPINS: Security protocols for sensor networks
As sensor networks edge closer towards wide-spread deployment, security issues become a
central concern. So far, much research has focused on making sensor networks feasible and …
central concern. So far, much research has focused on making sensor networks feasible and …
Mitigating routing misbehavior in mobile ad hoc networks
This paper describes two techniques that improve throughput in an ad hoc network in the
presence of nodes that agree to forward packets but fail to do so. To mitigate this problem …
presence of nodes that agree to forward packets but fail to do so. To mitigate this problem …
[PDF][PDF] Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments
In this paper, we analyze the network attacks that can be launched against IoT gateways,
identify the relevant metrics to detect them, and explain how they can be computed from …
identify the relevant metrics to detect them, and explain how they can be computed from …
Random key predistribution schemes for sensor networks
Key establishment in sensor networks is a challenging problem because asymmetric key
cryptosystems are unsuitable for use in resource constrained sensor nodes, and also …
cryptosystems are unsuitable for use in resource constrained sensor nodes, and also …
RFID security and privacy: A research survey
A Juels - IEEE journal on selected areas in communications, 2006 - ieeexplore.ieee.org
This paper surveys recent technical research on the problems of privacy and security for
radio frequency identification (RFID). RFID tags are small, wireless devices that help identify …
radio frequency identification (RFID). RFID tags are small, wireless devices that help identify …