A survey on internet of vehicles: Applications, security issues & solutions

S Sharma, B Kaushik - Vehicular Communications, 2019 - Elsevier
Abstract Internet of Vehicles (IoV) is an emerging concept in intelligent transportation
systems (ITS) to enhance the existing capabilities of VANETs by integrating with the Internet …

A systematic review of routing attacks detection in wireless sensor networks

Z Alansari, NB Anuar, A Kamsin, MR Belgaum - PeerJ Computer Science, 2022 - peerj.com
Wireless sensor networks (WSNs) consist of hundreds, or thousands of sensor nodes
distributed over a wide area and used as the Internet of Things (IoT) devices to benefit many …

Design and analysis of probing route to defense sink-hole attacks for Internet of Things security

Y Liu, M Ma, X Liu, NN Xiong, A Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) applications have been growing significantly in recent years,
however, the security issue has not been well studied in the literature for the IoT ecosystem …

[PDF][PDF] Black hole and sink hole attack detection in wireless body area networks

RK Dhanaraj, L Krishnasamy, O Geman… - … , Materials & Continua, 2021 - researchgate.net
In Wireless Body Area Networks (WBANs) with respect to health care, sensors are
positioned inside the body of an individual to transfer sensed data to a central station …

Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking

HA Babaeer, SA Al-Ahmadi - IEEE Access, 2020 - ieeexplore.ieee.org
In a wireless sensor network, the sensors periodically transmit sensed data from a specific
environment to a centralized station by wireless communication. Deployment in an open …

Sinkhole attacks in wireless sensor networks: A survey

A Rehman, SU Rehman, H Raheem - Wireless Personal Communications, 2019 - Springer
Wireless sensor networks (WSNs) consist of a large number of nodes, communicating
sensor readings to the base stations through other nodes. Due to their energy limitations …

What good are models?

EA Lee, M Sirjani - Formal Aspects of Component Software: 15th …, 2018 - Springer
Abstract Models are central to engineering. They are used for analysis, synthesis, and
communication between humans. A given artifact or process may have multiple models with …

Towards a secure ITS: Overview, challenges and solutions

L Sleem, HN Noura, R Couturier - Journal of Information Security and …, 2020 - Elsevier
Abstract Intelligent Transportation Systems (ITS), the heart of the new revolution of smart
transport, has evolved from the well-known Vehicular Ad hoc Networks (VANETs) to become …

Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks

N Wang, S Zhang, Z Zhang, J Qiao, J Fu… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the continuous development of sensor technology, more and more users hope to
monitor and collect information in a certain area safely and efficiently by deploying …

An efficient intrusion detection framework for mitigating blackhole and sinkhole attacks in healthcare wireless sensor networks

JL Webber, A Arafa, A Mehbodniya… - Computers and …, 2023 - Elsevier
Abstract A Wireless Sensor Network (WSN) is made up of physically dispersed autonomous
sensors which monitor the network and gather data about its surroundings. A sensor …