Security of the Internet of Things: perspectives and challenges

Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
Abstract Internet of Things (IoT) is playing a more and more important role after its showing
up, it covers from traditional equipment to general household objects such as WSNs and …

Internet of things: Vision, applications and research challenges

D Miorandi, S Sicari, F De Pellegrini, I Chlamtac - Ad hoc networks, 2012 - Elsevier
The term “Internet-of-Things” is used as an umbrella keyword for covering various aspects
related to the extension of the Internet and the Web into the physical realm, by means of the …

A hybrid approach to trust node assessment and management for vanets cooperative data communication: Historical interaction perspective

H Gao, C Liu, Y Yin, Y Xu, Y Li - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) provide self-organized wireless multihop transmission,
where nodes cooperate with each other to support data communication. However, malicious …

Sok: Security evaluation of home-based iot deployments

O Alrawi, C Lever, M Antonakakis… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
Home-based IoT devices have a bleak reputation regarding their security practices. On the
surface, the insecurities of IoT devices seem to be caused by integration problems that may …

A survey on trust models in heterogeneous networks

J Wang, Z Yan, H Wang, T Li… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Heterogeneous networks (HetNets) merge different types of networks into an integrated
network system, which has become a hot research area in recent years towards next …

Social Internet of Things (SIoT): Foundations, thrust areas, systematic review and future directions

MS Roopa, S Pattar, R Buyya, KR Venugopal… - Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) paradigm connects physical world and cyberspace via
physical objects and facilitate the development of smart applications and infrastructures. A …

A survey on trust management for mobile ad hoc networks

JH Cho, A Swami, R Chen - IEEE communications surveys & …, 2010 - ieeexplore.ieee.org
Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when
collaboration or cooperation is critical to achieving mission and system goals such as …

Performance analysis of the CONFIDANT protocol

S Buchegger, JY Le Boudec - Proceedings of the 3rd ACM international …, 2002 - dl.acm.org
Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing
and forwarding. However, it may be advantageous for individual nodes not to cooperate. We …

Oceanstore: An architecture for global-scale persistent storage

J Kubiatowicz, D Bindel, Y Chen, S Czerwinski… - ACM SIGOPS …, 2000 - dl.acm.org
OceanStore is a utility infrastructure designed to span the globe and provide continuous
access to persistent information. Since this infrastructure is comprised of untrusted servers …

A survey of trust in internet applications

T Grandison, M Sloman - IEEE Communications Surveys & …, 2000 - ieeexplore.ieee.org
Trust is an important aspect of decision making for Internet applications and particularly
influences the specification of security policy, ie, who is authorized to perform actions as well …