Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

A systematic review on clone node detection in static wireless sensor networks

M Numan, F Subhan, WZ Khan, S Hakak… - IEEE …, 2020 - ieeexplore.ieee.org
The recent state of the art innovations in technology enables the development of low-cost
sensor nodes with processing and communication capabilities. The unique characteristics of …

Secure and reliable wsn for internet of things: Challenges and enabling technologies

S Lata, S Mehfuz, S Urooj - IEEE Access, 2021 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is an innovative technology with a broad range of
applications and highly attractive benefits, such as low cost of implementation and data …

Distributed detection of clone attacks in wireless sensor networks

M Conti, R Di Pietro, L Mancini… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an
adversary can physically capture some of the nodes, first can reprogram, and then, can …

Distributed location and trust based replica detection in wireless sensor networks

G Amudha, P Narayanasamy - Wireless Personal Communications, 2018 - Springer
As wireless sensor networks (WSNs) are widely used in unattended environments, various
physical attacks are occurred easily. In this paper, location and trust based replica detection …

Random-walk based approach to detect clone attacks in wireless sensor networks

Y Zeng, J Cao, S Zhang, S Guo… - IEEE Journal on selected …, 2010 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone
attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts …

A survey on indoor positioning security and privacy

Y Sartayeva, HCB Chan - Computers & Security, 2023 - Elsevier
With rising demand for indoor location-based services (LBS) such as location-based
marketing, mobile navigation, etc., there has been considerable interest in indoor …

Detecting node replication attacks in wireless sensor networks: a survey

WT Zhu, J Zhou, RH Deng, F Bao - Journal of Network and Computer …, 2012 - Elsevier
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-
constrained sensor nodes, but is often deployed in unattended and harsh environments to …

LSCD: A low-storage clone detection protocol for cyber-physical systems

M Dong, K Ota, LT Yang, A Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Cyber-physical systems (CPSs) have recently become an important research field not only
because of their important and varied application scenarios, including transportation …

SpringerBriefs in Computer Science

S Zdonik, P Ning, S Shekhar, J Katz, X Wu, LC Jain… - 2012 - Springer
This is an introduction to multicast routing, which is the study of methods for routing from one
source to many destinations, or from many sources to many destinations. Multicast is …