[HTML][HTML] A systematic literature review on wireless security testbeds in the cyber-physical realm
Abstract The Cyber-Physical System (CPS) lies in the core of Industry 4.0, accelerating the
convergence of formerly barricaded operational technology systems with modern …
convergence of formerly barricaded operational technology systems with modern …
[HTML][HTML] A model-based mode-switching framework based on security vulnerability scores
Software vulnerabilities can affect critical systems within an organization impacting
processes, workflows, privacy, and safety. When a software vulnerability becomes known …
processes, workflows, privacy, and safety. When a software vulnerability becomes known …
An innovative and decentralized identity framework based on blockchain technology
Network users usually need a third party validation to prove that they are who they claim to
be. Authentication systems mostly assume the existence of a Trusted Third Party (TTP) in the …
be. Authentication systems mostly assume the existence of a Trusted Third Party (TTP) in the …
Adaptive monitor placement for near real-time node failure localisation in wireless sensor networks
As sensor-based networks become more prevalent, scaling to unmanageable numbers or
deployed in difficult to reach areas, real-time failure localisation is becoming essential for …
deployed in difficult to reach areas, real-time failure localisation is becoming essential for …
Towards RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach
The RPL protocol was initially created to connect multiple IP-based communication
applications in low-power and lossy network environments. However, it has become a target …
applications in low-power and lossy network environments. However, it has become a target …
Determining Distributions of Security Means for WSNs based on the Model of a Neighbourhood Watch
Neighbourhood watch is a concept allowing a community to distribute a complex security
task in between all members. Members carry out security tasks in a distributed and …
task in between all members. Members carry out security tasks in a distributed and …
Trust-Based Compromised Node Identification and Enhancement of Network Lifetime Using Alternate Path in a Wireless Sensor Network
V Junapudi, SK Udgata - … Conference on Information System Design and …, 2024 - Springer
Compromised node identification in a wireless sensor network (WSN) is crucial for ensuring
reliable communication. Different trust models have been proposed in the literature for …
reliable communication. Different trust models have been proposed in the literature for …
Trust-Based Compromised Node
V Junapudi, SK Udgata - … and Intelligent Systems: Proceedings of Eighth … - books.google.com
Compromised node identification in a wireless sensor network (WSN) is crucial for ensuring
reliable communication. Different trust models have been proposed in the literature for …
reliable communication. Different trust models have been proposed in the literature for …
[PDF][PDF] RESILIENT MIDDLEWARE FOR SMART SECURITY IN MEDICAL DEVICES
J Sametinger, JW Rozenblit - marshallplan.at
Network-connected medical devices and the Internet of Medical Things (IoMT) promise to
improve patient care and efficiency. At the same time, they increase the security risk. The …
improve patient care and efficiency. At the same time, they increase the security risk. The …