Trust management system in wireless sensor networks: design considerations and research challenges

F Ishmanov, AS Malik, SW Kim… - Transactions on …, 2015 - Wiley Online Library
Trust is an important factor in wireless sensor networks (WSNs) in terms of security
enhancement and successful collaboration. Trust management (TM) can ensure that all …

Overcoming limits of blockchain for IoT applications

F Buccafurri, G Lax, S Nicolazzo, A Nocera - Proceedings of the 12th …, 2017 - dl.acm.org
Blockchain technology allows the implementation of a public ledger securely recording
transactions among peers without the need of trusted third parties. For both researchers and …

Tweetchain: An alternative to blockchain for crowd-based applications

F Buccafurri, G Lax, S Nicolazzo, A Nocera - … 2017, Rome, Italy, June 5-8 …, 2017 - Springer
The assurance of information in the crowdsourcing domain cannot be committed to a single
party, but should be distributed over the crowd. Blockchain is an infrastructure allowing this …

A survey of access control models in wireless sensor networks

HA Maw, H Xiao, B Christianson… - Journal of Sensor and …, 2014 - mdpi.com
Wireless sensor networks (WSNs) have attracted considerable interest in the research
community, because of their wide range of applications. However, due to the distributed …

Security and privacy challenge in data aggregation for the iot in smart cities

JM Bohli, P Langendörfer, AF Skarmeta - Internet of Things, 2022 - taylorfrancis.com
The Internet of the Future will be an essential part of the knowledge society and will provide
new information-based business. The usage of the Internet of Things for large-scale …

A network access control framework for 6LoWPAN networks

LML Oliveira, JJPC Rodrigues, AF De Sousa, J Lloret - Sensors, 2013 - mdpi.com
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor
networks, represent an emerging technology with high potential to be employed in critical …

SUBBASE: An authentication scheme for wireless sensor networks based on user biometrics

R Riaz, NA Gillani, SS Rizvi, S Shokat… - … and Mobile Computing, 2019 - Wiley Online Library
To keep a network secure, a user authentication scheme that allows only authenticated
users to access network services is required. However, the limited resources of sensor …

Policy-based access control for DPWS-enabled ubiquitous devices

K Fysarakis, I Papaefstathiou… - Proceedings of the …, 2014 - ieeexplore.ieee.org
As computing becomes ubiquitous, researchers and engineers aim to exploit the potential of
the pervasive systems in order to introduce new types of services and address inveterate …

Light weight authentication framework for WSN

AH Moon, U Iqbal, GM Bhat - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Primarily deployed for monitoring environmental parameters, WSN are now finding
increased use in commercial, domestic, military and health applications. There deployment …

Policy-controlled authenticated access to LLN-connected healthcare resources

K Rantos, K Fysarakis, C Manifavas… - IEEE Systems …, 2015 - ieeexplore.ieee.org
Ubiquitous devices comprising several resource-constrained nodes with sensors, actuators,
and networking capabilities are becoming part of many solutions that seek to enhance user's …