[HTML][HTML] A systematic literature review on wireless security testbeds in the cyber-physical realm

V Kampourakis, V Gkioulos, S Katsikas - Computers & Security, 2023 - Elsevier
Abstract The Cyber-Physical System (CPS) lies in the core of Industry 4.0, accelerating the
convergence of formerly barricaded operational technology systems with modern …

[HTML][HTML] A model-based mode-switching framework based on security vulnerability scores

M Riegler, J Sametinger, M Vierhauser… - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities can affect critical systems within an organization impacting
processes, workflows, privacy, and safety. When a software vulnerability becomes known …

An innovative and decentralized identity framework based on blockchain technology

D Maldonado-Ruiz, J Torres… - 2021 11th IFIP …, 2021 - ieeexplore.ieee.org
Network users usually need a third party validation to prove that they are who they claim to
be. Authentication systems mostly assume the existence of a Trusted Third Party (TTP) in the …

Adaptive monitor placement for near real-time node failure localisation in wireless sensor networks

P Bezerra, PY Chen, JA McCann, W Yu - ACM Transactions on Sensor …, 2021 - dl.acm.org
As sensor-based networks become more prevalent, scaling to unmanageable numbers or
deployed in difficult to reach areas, real-time failure localisation is becoming essential for …

Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

H Albinali, F Azzedin - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …

Determining Distributions of Security Means for WSNs based on the Model of a Neighbourhood Watch

B Förster, P Langendörfer, T Hinze - IEEE Access, 2024 - ieeexplore.ieee.org
Neighbourhood watch is a concept allowing a community to distribute a complex security
task in between all members. Members carry out security tasks in a distributed and …

Trust-Based Compromised Node Identification and Enhancement of Network Lifetime Using Alternate Path in a Wireless Sensor Network

V Junapudi, SK Udgata - … Conference on Information System Design and …, 2024 - Springer
Compromised node identification in a wireless sensor network (WSN) is crucial for ensuring
reliable communication. Different trust models have been proposed in the literature for …

Trust-Based Compromised Node

V Junapudi, SK Udgata - … and Intelligent Systems: Proceedings of Eighth … - books.google.com
Compromised node identification in a wireless sensor network (WSN) is crucial for ensuring
reliable communication. Different trust models have been proposed in the literature for …

[PDF][PDF] RESILIENT MIDDLEWARE FOR SMART SECURITY IN MEDICAL DEVICES

J Sametinger, JW Rozenblit - marshallplan.at
Network-connected medical devices and the Internet of Medical Things (IoMT) promise to
improve patient care and efficiency. At the same time, they increase the security risk. The …