Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

Blockchain-assisted UAV communication systems: A comprehensive survey

S Hafeez, AR Khan, MM Al-Quraan… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-
effective and credible solutions for various real-world scenarios. UAVs provide an immense …

A survey on security and privacy issues of UAVs

Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti… - Computer Networks, 2023 - Elsevier
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …

Secure routing for internet of things: A survey

D Airehrour, J Gutierrez, SK Ray - Journal of Network and Computer …, 2016 - Elsevier
Abstract The Internet of Things (IoT) could be described as the pervasive and global network
which aids and provides a system for the monitoring and control of the physical world …

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

Routing protocols in ad hoc networks: A survey

A Boukerche, B Turgut, N Aydin, MZ Ahmad, L Bölöni… - Computer …, 2011 - Elsevier
Ad hoc wireless networks perform the difficult task of multi-hop communication in an
environment without a dedicated infrastructure, with mobile nodes and changing network …

Ariadne: A secure on-demand routing protocol for ad hoc networks

YC Hu, A Perrig, DB Johnson - Proceedings of the 8th annual …, 2002 - dl.acm.org
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …

Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks

B Bhushan, G Sahoo - Wireless Personal Communications, 2018 - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …

[HTML][HTML] Survey on security issues in vehicular ad hoc networks

B Mokhtar, M Azab - Alexandria engineering journal, 2015 - Elsevier
Abstract Vehicular Ad hoc NETworks are special case of ad hoc networks that, besides
lacking infrastructure, communicating entities move with various accelerations. Accordingly …

[BUCH][B] Germ Cell Tumor

A Matin - 2012 - books.google.com
The book aims to provide an overview of current knowledge regarding germ cell tumors. It
deals with the clinical presentations, treatment modalities, the biology and genetics of germ …