Privacy-preserving data aggregation in smart metering systems: An overview

Z Erkin, JR Troncoso-Pastoriza… - IEEE Signal …, 2013 - ieeexplore.ieee.org
Growing energy needs are forcing governments to look for alternative resources and ways to
better manage the energy grid and load balancing. As a major initiative, many countries …

Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints

A Mukherjee - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a
massive deployment of machine-type communication (MTC) devices. The limited hardware …

VeRA-version number and rank authentication in RPL

A Dvir, L Buttyan - … international conference on mobile ad-hoc …, 2011 - ieeexplore.ieee.org
Designing a routing protocol for large low-power and lossy networks (LLNs), consisting of
thousands of constrained nodes and unreliable links, presents new challenges. The IPv6 …

Lightweight mutual authentication for IoT and its applications

N Li, D Liu, S Nepal - IEEE Transactions on Sustainable …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) provides transparent and seamless incorporation of
heterogeneous and different end systems. It has been widely used in many applications …

On the energy cost of communication and cryptography in wireless sensor networks

G De Meulenaer, F Gosset… - … on Wireless and …, 2008 - ieeexplore.ieee.org
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we
investigate the energy cost of cryptographic protocols, both from a communication and a …

On emerging family of elliptic curves to secure internet of things: ECC comes of age

Z Liu, X Huang, Z Hu, MK Khan… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Lightweight Elliptic Curve Cryptography (ECC) is a critical component for constructing the
security system of Internet of Things (IoT). In this paper, we define an emerging family of …

The price of security in wireless sensor networks

J Lee, K Kapitanova, SH Son - Computer Networks, 2010 - Elsevier
With the increased application of wireless sensor networks (WSNs) to military, commercial,
and home environments, securing the data in the network has become a critical issue …

Cybersecurity issues in wireless sensor networks: current challenges and solutions

DE Boubiche, S Athmani, S Boubiche… - Wireless Personal …, 2021 - Springer
Wireless sensor networks are deployed without predefined infrastructure and are generally
left unattended. Indeed, the vulnerability of the wireless sensor networks to attacks comes …

Survey of security technologies on wireless sensor networks

Q Yang, X Zhu, H Fu, X Che - Journal of sensors, 2015 - Wiley Online Library
Because of their low cost and adaptability, wireless sensor networks are widely used in civil,
military, and commercial fields and other fields. However, since the sensor node in the …

TRAIL: Topology authentication in RPL

H Perrey, M Landsmann, O Ugus, TC Schmidt… - arXiv preprint arXiv …, 2013 - arxiv.org
The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was recently
introduced as the new routing standard for the Internet of Things. Although RPL defines …