Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

A new intrusion detection system based on KNN classification algorithm in wireless sensor network

W Li, P Yi, Y Wu, L Pan, J Li - Journal of Electrical and …, 2014 - Wiley Online Library
The Internet of Things has broad application in military field, commerce, environmental
monitoring, and many other fields. However, the open nature of the information media and …

Secure and reliable wsn for internet of things: Challenges and enabling technologies

S Lata, S Mehfuz, S Urooj - IEEE Access, 2021 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is an innovative technology with a broad range of
applications and highly attractive benefits, such as low cost of implementation and data …

An efficient hybrid anomaly detection scheme using K-means clustering for wireless sensor networks

M Wazid, AK Das - Wireless Personal Communications, 2016 - Springer
Sensor nodes in a wireless sensor network (WSN) may be lost due to enervation or
malicious attacks by an adversary. WSNs deployed for several applications including …

Preventing black hole attack in wireless sensor network using HMM

H Kalkha, H Satori, K Satori - Procedia computer science, 2019 - Elsevier
Secure routing is a difficult task because of the limited nature of wireless sensor network
resources. This paper provides a Hidden Markov Model solution to identify malicious nodes …

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks

M Wazid, AK Das, S Kumari… - Security and …, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) have several applications ranging from the civilian to
military applications. WSNs are prone to various hole attacks, such as sinkhole, wormhole …

A fuzzy logic trust model for secure routing in smart grid networks

A Alnasser, H Sun - IEEE access, 2017 - ieeexplore.ieee.org
Smart grids require communication networks to convey sensing and control data for
improving the efficiency of energy generation, transmission, and delivery. As a result, smart …

Designing efficient sinkhole attack detection mechanism in edge-based IoT deployment

S Pundir, M Wazid, DP Singh, AK Das, JJPC Rodrigues… - Sensors, 2020 - mdpi.com
The sinkhole attack in an edge-based Internet of Things (IoT) environment (EIoT) can
devastate and ruin the whole functioning of the communication. The sinkhole attacker nodes …

RAD‐EI: A routing attack detection scheme for edge‐based Internet of Things environment

M Wazid, P Reshma Dsouza, AK Das… - International Journal …, 2019 - Wiley Online Library
Summary Internet of Things (IoT) offers various types of application services in different
domains, such as “smart infrastructure, health‐care, critical infrastructure, and intelligent …

A secure group-based blackhole node detection scheme for hierarchical wireless sensor networks

M Wazid, AK Das - Wireless Personal Communications, 2017 - Springer
Rapid development of the wireless communication technology and low cost of sensing
devices has accelerated the development of wireless sensor networks (WSNs). These types …