[HTML][HTML] Information-aware secure routing in wireless sensor networks

Q Shi, L Qin, Y Ding, B Xie, J Zheng, L Song - Sensors, 2019 - mdpi.com
Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable
to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the …

Access control for distributed ledgers in the internet of things: A networking approach

A Cullen, P Ferraro, W Sanders… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
In the Internet of Things (IoT) domain, devices need a platform to transact seamlessly without
a trusted intermediary. Although distributed ledger technologies (DLTs) could provide such a …

Proactive defense for internet-of-things: moving target defense with cyberdeception

M Ge, JH Cho, D Kim, G Dixit, IR Chen - ACM Transactions on Internet …, 2021 - dl.acm.org
Resource constrained Internet-of-Things (IoT) devices are highly likely to be compromised
by attackers, because strong security protections may not be suitable to be deployed. This …

Secure Data Transportation With Software-Defined Networking and kn Secret Sharing for High-Confidence IoT Services

B Yuan, C Lin, H Zhao, D Zou, LT Yang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) has become a critical infrastructure in smart city services. Unlike
traditional network nodes, most of the current IoT devices are constrained with limited …

DDoS defense for IoT: A Stackelberg game model-enabled collaborative framework

X Chen, L Xiao, W Feng, N Ge… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The proliferation of Distributed Denial of Service (DDoS) attacks in Internet of Things (IoT)
not only threatens the security of digital devices and infrastructure but also severely …

[引用][C] A security transmission model for internet of things

ZQ Wu, YW Zhou, JF Ma - Jisuanji …, 2011 - … North Street| c Beijing| z 100717| e …

Monarch-EWA: Monarch-earthworm-based secure routing protocol in IoT

S Sugave, B Jagdale - The Computer Journal, 2020 - academic.oup.com
Routing in the Internet of Things (IoT) renders the protection against various network attacks
as any attacker intrudes the routing mechanism for establishing the destructive mechanisms …

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …

Intelligent secure communication for Internet of Things with statistical channel state information of attacker

J Xia, Y Xu, D Deng, Q Zhou, L Fan - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the power control strategy of intelligent secure communication
with statistic channel state information (CSI) for Internet of Things (IoT) networks, where a …

Security and privacy in the internet-of-things under time-and-budget-limited adversary model

SN Premnath, ZJ Haas - IEEE Wireless Communications …, 2015 - ieeexplore.ieee.org
Internet-of-Things (IoT) represents an emerging era of networking that connects a variety of
common appliances to one another, as well as with the rest of the Internet, to vastly improve …