IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges

P Anand, Y Singh, A Selwal, M Alazab, S Tanwar… - IEEE …, 2020 - ieeexplore.ieee.org
… and provided necessary countermeasures for edge nodes, … percent of smart devices are
prone to stealthy cyber-attacks [… It is a distance-vector routing protocol, which allows the nodes to …

A study on various attacks and detection methodologies in software defined networks

S Singh, SKV Jayakumar - Wireless Personal Communications, 2020 - Springer
… corresponding countermeasure techniques. Typically, the … nodes, and it disrupts the underlying
routing protocol [27]. This type of … In 2011 second international conference on intelligent

Securing vehicle-to-everything (V2X) communication platforms

M Hasan, S Mohan, T Shimizu… - … Transactions on Intelligent …, 2020 - ieeexplore.ieee.org
… [57] where an adversary obeys the routing protocol … The proposed mechanism may not work
for an intelligent, stealthy attacker … For details of GPS spoofing countermeasures and recent …

A comprehensive review of architecture, communication, and cybersecurity in networked microgrid systems

A Aghmadi, H Hussein, KH Polara, O Mohammed - Inventions, 2023 - mdpi.com
… Device-to-device communication and multicasting data to … learning in improving the security
of smart grids and MANETs. … In this section, we categorize countermeasures in smart grid …

IoT Networks: Using Machine Learning Algorithm for Service Denial Detection in Constrained Application Protocol

A Abdullahi, ON Francisca… - COVENANT …, 2023 - journals.covenantuniversity.edu.ng
… by [32] for the smart home IoT network. As the stealth activities of DoS attacks, which is
like … of IoT devices protocol and countermeasures for an MQTT DoS attack is an SSL / TLS …

Security of multi-agent cyber-physical systems: A survey

R Owoputi, S Ray - IEEE Access, 2022 - ieeexplore.ieee.org
… the best countermeasure for specific types of attacks based … against false data injection
attacks in smart grid networks. The … A multiplicative coordinated stealthy attack and its detection …

A state-of-the-art review on the security of mainstream IoT wireless PAN protocol stacks

G Kambourakis, C Kolias, D Geneiatakis, G Karopoulos… - Symmetry, 2020 - mdpi.com
their numerous applications, ranging from healthcare, smart … jamming, which automatically
makes it more stealthy. Rather … integrity vulnerabilities of the routing protocol. In addition, the …

Cyber-physical power and energy systems with wireless sensor networks: A systematic review

TT Nguyen, F Mohammadi - Journal of Electrical Engineering & …, 2023 - Springer
… ) to cyber-physical attacks are the major concerns for a secure smart grid implementation [47]…
threats and solutions for the smart grid are analyzed. In [57], smart grid security aspects and …

Fast, reliable, and secure drone communication: A comprehensive survey

V Hassija, V Chamola, A Agrawal… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
… of drones and IoT specifically for smart cities. Another work … As the routing protocol algorithm
looks for the nearest node to … the entire design of the stealth drones to make their own Sa’…

Smart Grid Communication Based on IEEE 2030 Standard

Z Bouida, J Fattahi, A Ahmed, M Ibnkahla… - … of Wireless Networks, 2020 - Springer
Multicast multigroup beamforming is another widely studied field in … attack the data transmission
process (Yu et al. 2009). However, it is highly possible for an intelligent attacker to attack