Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

Privacy-preserving schemes for ad hoc social networks: A survey

MA Ferrag, L Maglaras, A Ahmim - … Communications Surveys & …, 2017 - ieeexplore.ieee.org
We review the state of the art of privacypreserving schemes for ad hoc social networks
including mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically …

Security for 5G mobile wireless networks

D Fang, Y Qian, RQ Hu - IEEE access, 2017 - ieeexplore.ieee.org
The advanced features of 5G mobile wireless network systems yield new security
requirements and challenges. This paper presents a comprehensive study on the security of …

Two decades of SCADA exploitation: A brief history

SD Anton, D Fraunholz, C Lipps, F Pohl… - … IEEE Conference on …, 2017 - ieeexplore.ieee.org
Since the early 1960, industrial process control has been applied by electric systems. In the
mid 1970's, the term SCADA emerged, describing the automated control and data …

Vurle: Automatic vulnerability detection and repair by learning from examples

S Ma, F Thung, D Lo, C Sun, RH Deng - … 11-15, 2017, Proceedings, Part II …, 2017 - Springer
Vulnerability becomes a major threat to the security of many systems. Attackers can steal
private information and perform harmful actions by exploiting unpatched vulnerabilities …

Security smells in android

M Ghafari, P Gadient… - 2017 IEEE 17th …, 2017 - ieeexplore.ieee.org
The ubiquity of smartphones, and their very broad capabilities and usage, make the security
of these devices tremendously important. Unfortunately, despite all progress in security and …

Security against network attacks in supervisory control systems

PM Lima, MVS Alves, LK Carvalho, MV Moreira - IFAC-PapersOnLine, 2017 - Elsevier
Cyber-physical systems (CPSs) integrate computing and communication capabilities to
monitor and control physical processes. In order to do so, communication networks are …

Intrusion detection of industrial control system based on Modbus TCP protocol

W Yusheng, F Kefeng, L Yingxu… - 2017 IEEE 13th …, 2017 - ieeexplore.ieee.org
Modbus over TCP/IP is one of the most popular industrial network protocol that are widely
used in critical infrastructures. However, vulnerability of Modbus TCP protocol has attracted …

A Consensus Framework for Reliability and Mitigation of Zero‐Day Attacks in IoT

V Sharma, K Lee, S Kwon, J Kim, H Park… - Security and …, 2017 - Wiley Online Library
“Internet of Things”(IoT) bridges the communication barrier between the computing entities
by forming a network between them. With a common solution for control and management of …

Distributed calculation of edge-disjoint spanning trees for robustifying distributed algorithms against man-in-the-middle attacks

G Oliva, S Cioabă… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we provide a distributed methodology to allow a network of agents, tasked to
execute a distributed algorithm, to overcome Man-in-the-Middle (MITM) attacks that aim at …