The evolution of cellular backhaul technologies: Current issues and future trends

O Tipmongkolsilp, S Zaghloul… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The rapid increase of the number of mobile subscribers as well as the deployment of 3G
technologies are putting strain on mobile backhaul operational expenditures (OPEX) which …

Intrusion detection systems in wireless sensor networks: a review

NA Alrajeh, S Khan, B Shams - International Journal of …, 2013 - journals.sagepub.com
Wireless Sensor Networks (WSNs) consist of sensor nodes deployed in a manner to collect
information about surrounding environment. Their distributed nature, multihop data …

A survey of routing protocols for smart grid communications

N Saputro, K Akkaya, S Uludag - Computer Networks, 2012 - Elsevier
With the recent initiatives to upgrade the existing power grid to the Smart Grid (SG), there
has been a significant interest in the design and development of an efficient communications …

Security in wireless ad-hoc networks–a survey

R Di Pietro, S Guarino, NV Verde… - Computer …, 2014 - Elsevier
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …

Survey on sybil attack defense mechanisms in wireless ad hoc networks

A Vasudeva, M Sood - Journal of Network and Computer Applications, 2018 - Elsevier
Wireless ad hoc networks are vulnerable to Sybil attacks due to the broadcast nature of the
wireless medium and an absence of central authority. In a Sybil attack, an adversary …

A review on security challenges of wireless communications in disaster emergency response and crisis management situations

A Seba, N Nouali-Taboudjemat, N Badache… - Journal of Network and …, 2019 - Elsevier
In all disaster management mission areas such as prevention, protection, mitigation,
response and recovery, the first pressing need is to establish a communication network for …

[HTML][HTML] A distributed IDS architecture model for Smart Home systems

M Gajewski, JM Batalla, G Mastorakis… - Cluster …, 2019 - Springer
The common use of smart devices encourages potential attackers to violate privacy.
Sometimes taking control of one device allows the attacker to obtain secret data (such as …

Survey on IoV routing protocols: Security and network architecture

L Alouache, N Nguyen, M Aliouat… - International Journal of …, 2019 - Wiley Online Library
As today, vehicles are equipped with wireless sensors and on‐board computers capable of
collecting and processing a large amount of data; they can communicate to each other via …

On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications

S Alanazi, J Al-Muhtadi, A Derhab… - … Conference on E …, 2015 - ieeexplore.ieee.org
The future of ambient assisted living (AAL) especially eHealthcare almost depends on the
smart objects that are part of the Internet of things (IoT). In our AAL scenario, these objects …

[PDF][PDF] Rethinking safety in autonomous ecosystems

D Halasz, B Buhnova - IEEE, 2022 - annals-csis.org
As autonomous cyber-physical systems are responding to the dynamism of our hyper-
connected digital world, they are forming so called dynamic autonomous ecosystems, which …