Security in wireless ad-hoc networks–a survey

R Di Pietro, S Guarino, NV Verde… - Computer …, 2014 - Elsevier
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …

Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges

A Vangala, AK Das, V Chamola, V Korotaev… - Cluster …, 2023 - Springer
Agricultural industry is one of the most vital industries that has a major contribution to the
economy due to its share in the Gross Domestic Product (GDP) and as a source of …

Practical overview of security issues in wireless sensor network applications

H Radhappa, L Pan, J Xi Zheng… - International journal of …, 2018 - Taylor & Francis
Wireless sensor networks are widely used in applications to monitor and communicate data.
Even though the wireless sensor networks have been broadly used in critical applications …

A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems

X Yang, J Lin, W Yu, PM Moulema… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In Cyber-Physical Networked Systems (CPNS), the adversary can inject false measurements
into the controller through compromised sensor nodes, which not only threaten the security …

An authentication framework for wireless sensor networks using identity-based signatures

R Yasmin, E Ritter, G Wang - 2010 10th IEEE International …, 2010 - ieeexplore.ieee.org
In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to
avoid attacks against secure communication, and to mitigate DoS attacks exploiting the …

Distributed detection in mobile access wireless sensor networks under byzantine attacks

M Abdelhakim, LE Lightfoot, J Ren… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper explores reliable data fusion in mobile access wireless sensor networks under
Byzantine attacks. We consider the q-out-of-m rule, which is popular in distributed detection …

An efficient privacy preserving message authentication scheme for internet-of-things

J Wei, TVX Phuong, G Yang - IEEE Transactions on Industrial …, 2020 - ieeexplore.ieee.org
As an essential element of the next generation Internet, Internet of Things (IoT) has been
undergoing an extensive development in recent years. In addition to the enhancement of …

Hop-by-hop message authenticationand source privacy in wirelesssensor networks

J Li, Y Li, J Ren, J Wu - IEEE transactions on parallel and …, 2013 - ieeexplore.ieee.org
Message authentication is one of the most effective ways to thwart unauthorized and
corrupted messages from being forwarded in wireless sensor networks (WSNs). For this …

Attacking cryptographic schemes based on" perturbation polynomials"

M Albrecht, C Gentry, S Halevi, J Katz - … of the 16th ACM conference on …, 2009 - dl.acm.org
We show attacks on several cryptographic schemes that have recently been proposed for
achieving various security goals in sensor networks. Roughly speaking, these schemes all …

Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm

V Mohindru, Y Singh, R Bhatt - International Journal of …, 2020 - inderscienceonline.com
Message communication in WSNs is not secure because energy-starving networks are
vulnerable to numerous security attacks mainly due to their nature of distribution and …