A survey of intrusion detection systems in wireless sensor networks

I Butun, SD Morgera, R Sankar - IEEE communications surveys …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …

A comprehensive survey of v2x cybersecurity mechanisms and future research paths

R Sedar, C Kalalas, F Vázquez-Gallego… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Recent advancements in vehicle-to-everything (V2X) communication have notably improved
existing transport systems by enabling increased connectivity and driving autonomy levels …

RETRACTED ARTICLE: A Secure Machine Learning-Based Optimal Routing in Ad Hoc Networks for Classifying and Predicting Vulnerabilities

A Reddy Yeruva, E Saleh Alomari… - Cybernetics and …, 2023 - Taylor & Francis
In both the military and the civilian sectors, next-generation wireless networks can be
employed for a wide range of intricate and adaptive applications. It is possible that …

A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV

F Sakiz, S Sen - Ad Hoc Networks, 2017 - Elsevier
Vehicular ad hoc networks (VANETs) have become one of the most promising and fastest
growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart …

ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks

W Li, H Song - IEEE transactions on intelligent transportation …, 2015 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) have the potential to transform the way people travel
through the creation of a safe interoperable wireless communications network that includes …

SVELTE: Real-time intrusion detection in the Internet of Things

S Raza, L Wallgren, T Voigt - Ad hoc networks, 2013 - Elsevier
Abstract In the Internet of Things (IoT), resource-constrained things are connected to the
unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are …

Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …

Trust management system design for the Internet of Things: A context-aware and multi-service approach

YB Saied, A Olivereau, D Zeghlache, M Laurent - Computers & Security, 2013 - Elsevier
This work proposes a new trust management system (TMS) for the Internet of Things (IoT).
The wide majority of these systems are today bound to the assessment of trustworthiness …

Survey on misbehavior detection in cooperative intelligent transportation systems

RW Van Der Heijden, S Dietzel… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Cooperative intelligent transportation systems (cITS) are a promising technology to enhance
driving safety and efficiency. Vehicles communicate wirelessly with other vehicles and …

Data collection for security measurement in wireless sensor networks: A survey

H Xie, Z Yan, Z Yao… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Wireless sensor network (WSN) is an indispensible part of Internet of Things that has been
applied in many fields to monitor environments and collect data from surroundings …