Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

Security of the Internet of Things: perspectives and challenges

Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
Abstract Internet of Things (IoT) is playing a more and more important role after its showing
up, it covers from traditional equipment to general household objects such as WSNs and …

Proofs of space

S Dziembowski, S Faust, V Kolmogorov… - Annual Cryptology …, 2015 - Springer
Proofs of work (PoW) have been suggested by Dwork and Naor (Crypto'92) as protection to
a shared resource. The basic idea is to ask the service requestor to dedicate some non …

Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks

B Bhushan, G Sahoo - Wireless Personal Communications, 2018 - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …

Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

A survey of security issues in wireless sensor networks

Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …

Spacemint: A cryptocurrency based on proofs of space

S Park, A Kwon, G Fuchsbauer, P Gaži, J Alwen… - … Cryptography and Data …, 2018 - Springer
Bitcoin has become the most successful cryptocurrency ever deployed, and its most
distinctive feature is that it is decentralized. Its underlying protocol (Nakamoto consensus) …

Wireless sensor network security: A survey

JP Walters, Z Liang, W Shi… - Security in distributed, grid …, 2007 - taylorfrancis.com
368As wireless sensor networks continue to grow, so does the need for effective security
mechanisms. Because sensor networks may interact with sensitive data and/or operate in …

A survey on wireless sensor network security

J Sen - arXiv preprint arXiv:1011.1529, 2010 - arxiv.org
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research
community due their wide range of applications. Due to distributed nature of these networks …

Securing wireless sensor networks: a survey

Y Zhou, Y Fang, Y Zhang - IEEE Communications Surveys & …, 2008 - ieeexplore.ieee.org
The significant advances of hardware manufacturing technology and the development of
efficient software algorithms make technically and economically feasible a network …