Node-capture resilient key establishment in sensor networks: Design space and new protocols

A Newell, H Yao, A Ryker, T Ho… - ACM Computing Surveys …, 2014 - dl.acm.org
Key management is required for basic security services of confidentiality, integrity, and data
source authentication. Wireless sensor networks (WSNs) are a challenging environment to …

Using GIS to develop a mobile communications network for disaster-damaged areas

Y Kawamura, AM Dewan, B Veenendaal… - … Journal of Digital …, 2014 - Taylor & Francis
Communications network damage resulting from a large disaster causes difficulties in the
ability to rapidly understand the current situation and thus make appropriate decisions …

Tracing where IoT data are collected and aggregated

C Bodei, P Degano, GL Ferrari… - Logical Methods in …, 2017 - lmcs.episciences.org
The Internet of Things (IoT) offers the infrastructure of the information society. It hosts smart
objects that automatically collect and exchange data of various kinds, directly gathered from …

A Review of Formal Security Verification of Common Internet of Things (IoT) Communication Protocols

I Bouziane, H Belmokadem… - 2023 7th IEEE Congress …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is characterized by a myriad of communication protocols that
enable seamless connectivity among devices. However, the open nature of the internet …

A wireless greenhouse monitoring system based on solar energy

L Gao, M Cheng, J Tang - TELKOMNIKA Indonesian Journal of …, 2013 - journal.esperg.com
To resolve the problems of complicated cabling and costly wired network in the current
system, we designed a wireless greenhouse monitoring system based on ZigBee and GSM …

Attack vectors to wireless zigbee network communications-Analysis and countermeasures

J Markert, M Massoth… - Proceedings of the …, 2011 - books.google.com
New communication technologies offer new opportunities for developers. Yet, they also bear
new risks through potential attacks by an intruder. The purpose of this paper is to present the …

Optimizing zigbee security using stochastic model checking

E Yüksel, HR Nielson, F Nielson, M Fruth… - arxiv preprint arxiv …, 2012 - arxiv.org
ZigBee is a fairly new but promising wireless sensor network standard that offers the
advantages of simple and low resource communication. Nevertheless, security is of great …

Study and design of energy efficient block cipher for wireless body area networks (WBANs)

N Datta - 2018 - etd.iisc.ac.in
With the advent of better health care and medical technology, as well as miniaturized
devices with built-in radios, today we can see (WBANs) emerging as one of the main …

Analysing zigbee key establishment protocols

E Yüksel - arxiv preprint arxiv:1205.6678, 2012 - arxiv.org
In this report, we present our approach for protocol analysis together with a real example
where we find an important flow in a contemporary wireless sensor network security …

My home is my bazaar-A taxonomy and classification of current wireless home network protocols

R Torbensen, KM Hansen… - 2011 Second Eastern …, 2011 - ieeexplore.ieee.org
Recent advances in wireless communication have produced a multitude of related protocols,
leading to a growing market of products for home automation systems within energy …