PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

Markov decision processes with applications in wireless sensor networks: A survey

MA Alsheikh, DT Hoang, D Niyato… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The
devices cooperate to monitor one or more physical phenomena within an area of interest …

Autonomic schemes for threat mitigation in Internet of Things

QM Ashraf, MH Habaebi - Journal of Network and Computer Applications, 2015 - Elsevier
Abstract Internet of Things (IoT) refers to the expansion of Internet technologies to include
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …

Security in wireless ad-hoc networks–a survey

R Di Pietro, S Guarino, NV Verde… - Computer …, 2014 - Elsevier
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …

Survey on sybil attack defense mechanisms in wireless ad hoc networks

A Vasudeva, M Sood - Journal of Network and Computer Applications, 2018 - Elsevier
Wireless ad hoc networks are vulnerable to Sybil attacks due to the broadcast nature of the
wireless medium and an absence of central authority. In a Sybil attack, an adversary …

Security to wireless sensor networks against malicious attacks using Hamming residue method

M Alotaibi - EURASIP Journal on Wireless Communications and …, 2019 - Springer
Wireless sensor networks (WSNs) consist of small sensor nodes with limited energy. Such
nodes have the ability to monitor the physical conditions and communicate information …

Detection and mitigation of node replication attacks in wireless sensor networks: a survey

WZ Khan, MY Aalsalem… - … Journal of Distributed …, 2013 - journals.sagepub.com
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-
constrained sensor nodes which are commonly not tamper proof. As a result, wireless …

Security and privacy in emerging wireless networks

D Ma, G Tsudik - IEEE Wireless Communications, 2010 - ieeexplore.ieee.org
Wireless communication is continuing to make inroads into many facets of society and is
gradually becoming more and more ubiquitous. While in the past wireless communication …

Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks

K Kapusta, G Memmi, H Noura - Annals of Telecommunications, 2019 - Springer
Data fragmentation and dispersion is recognized as a way of providing confidentiality and
availability of data stored inside unattended wireless sensor networks. This paper introduces …

Exploiting context-awareness to enhance source-location privacy in wireless sensor networks

R Rios, J Lopez - The Computer Journal, 2011 - academic.oup.com
The source-location privacy problem in Wireless Sensor Networks has been traditionally
tackled by the creation of random routes for every packet transmitted from the source nodes …