Autonomic schemes for threat mitigation in Internet of Things

QM Ashraf, MH Habaebi - Journal of Network and Computer Applications, 2015 - Elsevier
Abstract Internet of Things (IoT) refers to the expansion of Internet technologies to include
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …

A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …

Node-capture resilient key establishment in sensor networks: Design space and new protocols

A Newell, H Yao, A Ryker, T Ho… - ACM Computing Surveys …, 2014 - dl.acm.org
Key management is required for basic security services of confidentiality, integrity, and data
source authentication. Wireless sensor networks (WSNs) are a challenging environment to …

An adaptive approach to detecting black and gray hole attacks in ad hoc network

J Cai, P Yi, J Chen, Z Wang… - 2010 24th IEEE …, 2010 - ieeexplore.ieee.org
Black and gray hole attack is one kind of routing disturbing attacks and can bring great
damage to the network. As a result, an efficient algorithm to detect black and gray attack is …

Detection of malicious attack in MANET a behavioral approach

M Patel, S Sharma - 2013 3rd IEEE International Advance …, 2013 - ieeexplore.ieee.org
Topology of MANET is dynamic in nature due to this characteristic in this network build
routing mechanism more convoluted and anxious and consequently nodes are more …

Smooth multirate multicast congestion control

GI Kwon, JW Byers - … -second Annual Joint Conference of the …, 2003 - ieeexplore.ieee.org
A significant impediment to deployment of multicast services is the daunting technical
complexity of developing, testing and validating congestion control protocols fit for wide-area …

An online mechanism for detection of gray-hole attacks on PMU data

S Pal, B Sikdar, JH Chow - IEEE Transactions on Smart Grid, 2016 - ieeexplore.ieee.org
Data from phasor measurement units (PMUs) enable the efficient functioning of critical
power applications supporting real-time monitoring, advanced protection, and dynamic …

Impact of DoS attack in IoT system and identifying the attacker location for interference attacks

S Sinha - … 6th international conference on communication and …, 2021 - ieeexplore.ieee.org
Security in Internet of Things (IoT) is major concerned today. RPL is one of the protocols
used in network layer of IoT and vulnerable to different types of attack. DoS attack is one of …

Attacks and counterattacks on wireless sensor networks

N Fatema, R Brad - arXiv preprint arXiv:1401.4443, 2014 - arxiv.org
WSN is formed by autonomous nodes with partial memory, communication range, power,
and bandwidth. Their occupation depends on inspecting corporal and environmental …

A countermeasure to black hole attacks in mobile ad hoc networks

K Osathanunkul, N Zhang - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
This paper presents a solution to counter black hole attacks in mobile ad hoc networks
(MANETs). Black hole attacks are effective DoS (Denial of Service) attacks committed by …