Online distributed IoT security monitoring with multidimensional streaming big data

F Li, R Xie, Z Wang, L Guo, J Ye, P Ma… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) enables extensive connections between cyber and physical “things.”
Nevertheless, the streaming data among IoT sensors bring “big data” issues, for example …

Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments

M Walshe, G Epiphaniou, H Al-Khateeb… - Ad Hoc Networks, 2019 - Elsevier
Current authentication protocols seek to establish authenticated sessions over insecure
channels while maintaining a small footprint considering the energy consumption and …

[PDF][PDF] A study on intrusion detection system in wireless sensor networks

S Godala, RPV Vaddella - International Journal of Communication …, 2020 - researchgate.net
The technology of Wireless Sensor Networks (WSNs) has become most significant in
present day. WSNs are extensively used in applications like military, industry, health, smart …

Denial-of-sleep attacks against IoT networks

A Gallais, TH Hedli, V Loscri… - 2019 6th International …, 2019 - ieeexplore.ieee.org
Numerous medium access control (MAC) have been proposed for Low-power Lossy
Networks (LLNs) over the recent years. They aim at ensuring both energy efficiency and …

An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles

S Gupta, C Maple, R Passerone - IEEE Access, 2023 - ieeexplore.ieee.org
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …

GA‐DoSLD: genetic algorithm based denial‐of‐sleep attack detection in WSN

M Gunasekaran… - Security and …, 2017 - Wiley Online Library
Denial‐of‐sleep (DoSL) attack is a special category of denial‐of‐service attack that prevents
the battery powered sensor nodes from going into the sleep mode, thus affecting the network …

A Survey of Security Mechanisms for Edge Computing based Connected Autonomous Vehicles

S Gupta, C Maple - Authorea Preprints, 2023 - techrxiv.org
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …

Anti-malicious attack algorithm for low-power wake-up radio protocol

H Park - IEEE Access, 2020 - ieeexplore.ieee.org
The in-depth discussion on the development of green technology at the 25th Wireless World
Research Forum (WWRF) Conference in November 2010 indicated the growing interest in …

Performance analysis of denial-of-sleep attack-prone MAC protocols in wireless sensor networks

E Udoh, V Getov - 2018 UKSim-AMSS 20th International …, 2018 - ieeexplore.ieee.org
Wireless sensor networks which form part of the core for the Internet of Things consist of
resource constrained sensors that are usually powered by batteries. Therefore, careful …

IoT Hardware‐Based Security: A Generalized Review of Threats and Countermeasures

C Higgins, L McDonald, M Ijaz Ul Haq… - Security and Privacy in …, 2021 - Wiley Online Library
Security in the Internet of Things (IoT) is paramount as the number of IoT devices are on the
rise and new applications are emerging. This chapter presents different types of hardware …