JH Ziegeldorf, OG Morchon… - Security and …, 2014 - Wiley Online Library
ABSTRACT The Internet of Things paradigm envisions the pervasive interconnection and cooperation of smart things over the current and future Internet infrastructure. The Internet of …
Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among these, the attacks targeted at the base station are the most devastating ones since this …
A Arivarasi, P Ramesh - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
A wireless sensor network is a set of sensor nodes used to identify the environment and the corresponding object. It collects all the data of the situation and transmits this detected data …
Cyber‐physical systems (CPSs) are expected to collect, process, and exchange data that regularly contain sensitive information. CPSs may, for example, involve a person in the …
R Rios, J Lopez, J Cuellar - Foundations of Security Analysis and Design …, 2014 - Springer
Privacy preservation is gaining popularity in Wireless Sensor Network (WSNs) due to its adoption in everyday scenarios. There are a number of research papers in this area many of …
J Lopez, R Rios, J Cuellar - … Conference, ISPEC 2014, Fuzhou, China, May …, 2014 - Springer
Wireless sensor networks (WSNs) are exposed to many different types of attacks. Among these, the most devastating attack is to compromise or destroy the base station since all …
In addition to our work on the Internet of Things, NICS was also involved in the security of sensor devices that are not directly connected to the Internet: Wireless Sensor Networks …
Using a communication network entails an inherent privacy risk: packets cross an infrastructure maintained by several parties other than the sender and receiver, each of …
Continuous advances in electronics, wireless technologies, manufacturing processes, and software engineering have led to the proliferation of a plethora of mobile devices–mobile …