Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities

N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
The fifth generation (5G) wireless technologies serve as a key propellent to meet the
increasing demands of the future Internet of Things (IoT) networks. For wireless …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

A novel ontology and machine learning driven hybrid cardiovascular clinical prognosis as a complex adaptive clinical system

K Farooq, A Hussain - Complex Adaptive Systems Modeling, 2016 - Springer
Purpose This multidisciplinary industrial research project sets out to develop a hybrid clinical
decision support mechanism (inspired by ontology and machine learning driven techniques) …

Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks

M Abomhara, GM Køien - Journal of Cyber Security …, 2015 - journals.riverpublishers.com
Abstract Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services
are becoming pervasive. Their success has not gone unnoticed and the number of threats …

A survey of intrusion detection systems in wireless sensor networks

I Butun, SD Morgera, R Sankar - IEEE communications surveys …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …

WSN‐DS: a dataset for intrusion detection systems in wireless sensor networks

I Almomani, B Al-Kasasbeh, M Al-Akhras - Journal of Sensors, 2016 - Wiley Online Library
Wireless Sensor Networks (WSN) have become increasingly one of the hottest research
areas in computer science due to their wide range of applications including critical military …

A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems

E Benkhelifa, T Welsh… - … communications surveys & …, 2018 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous
nature of devices and protocols in use, the sensitivity of the data contained within, as well as …

LEAP+ Efficient security mechanisms for large-scale distributed sensor networks

S Zhu, S Setia, S Jajodia - ACM Transactions on Sensor Networks …, 2006 - dl.acm.org
We describe LEAP+ (Localized Encryption and Authentication Protocol), a key management
protocol for sensor networks that is designed to support in-network processing, while at the …

Energy‐efficient modified LEACH protocol for IoT application

TM Behera, UC Samal… - IET Wireless Sensor …, 2018 - Wiley Online Library
Wireless sensor networks (WSNs) have a wide range of applications in various fields. One of
the most recent emerging applications are in the world of Internet of Things (IoT), which …