A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

MTD, where art thou? A systematic review of moving target defense techniques for IoT

RE Navas, F Cuppens, NB Cuppens… - IEEE internet of …, 2020 - ieeexplore.ieee.org
Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but
their security lags behind the state of the art of non-IoT systems. Moving target defense …

High-performance wireless networks for industrial control applications: New targets and feasibility

M Luvisotto, Z Pang, D Dzung - Proceedings of the IEEE, 2019 - ieeexplore.ieee.org
Wireless networks are ever more deployed in the industrial control scenario, thanks to the
numerous benefits they can bring, especially in terms of costs and flexibility. However, some …

DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15. 4e TSCH networks

M Tiloca, DD Guglielmo, G Dini, G Anastasi… - ACM Transactions on …, 2018 - dl.acm.org
The MAC standard amendment IEEE 802.15. 4e is designed to meet the requirements of
industrial and critical applications. In particular, the Time Slotted Channel Hopping (TSCH) …

A survey on intelligent MAC layer jamming attacks and countermeasures in WSNs

T Hamza, G Kaddoum, A Meddeb… - 2016 IEEE 84th …, 2016 - ieeexplore.ieee.org
Security abides a tremendous key requirement in the context of Internet of Things (IoT). IoT
connects multiple objects together through wired and wireless connections in the aim of …

JAMMY: A distributed and dynamic solution to selective jamming attack in TDMA WSNs

M Tiloca, D De Guglielmo, G Dini… - … on Dependable and …, 2015 - ieeexplore.ieee.org
Time division multiple access (TDMA) is often used in wireless sensor networks (WSNs),
especially for critical applications, as it provides high energy efficiency, guaranteed …

Mitigating selective jamming attacks in smart meter data collection using moving target defense

R Algin, HO Tan, K Akkaya - Proceedings of the 13th ACM Symposium …, 2017 - dl.acm.org
In Advanced Metering Infrastructure (AMI) networks, power data collections from smart
meters are static. Due to such static nature, attackers may predict the transmission behavior …

Markov chain based ant colony approach for mitigating DDoS attacks using integrated vehicle mode analysis in VANET

R Kolandaisamy, RM Noor, MR Zaba… - 2019 IEEE 1st …, 2019 - ieeexplore.ieee.org
Vehicular Ad-hoc Networks (VANET) remains receiving increasing attention in arrears to the
multiplicity of services that they existent. VANET is mostly measured to present security …

A simulation tool for evaluating attack impact in cyber physical systems

G Dini, M Tiloca - Modelling and Simulation for Autonomous Systems …, 2014 - Springer
Security is getting an ever increasingly important issue in cyber-physical systems comprising
autonomous systems. However, it is not possible to defend from all possible attacks for cost …

[PDF][PDF] Jamming Attack-A Survey.

K Sharma, S Bhatt - International Journal of Recent Research Aspects, 2018 - ijrra.net
In this digital world, IoT is grabbing the major part. Every initiative related to the Wireless
Sensor Network has the backbone as IoT. IoT is specialized in sensing, network …