IoT elements, layered architectures and security issues: A comprehensive survey

M Burhan, RA Rehman, B Khan, BS Kim - sensors, 2018 - mdpi.com
The use of the Internet is growing in this day and age, so another area has developed to use
the Internet, called Internet of Things (IoT). It facilitates the machines and objects to …

A survey of intrusion detection systems in wireless sensor networks

I Butun, SD Morgera, R Sankar - IEEE communications surveys …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …

Staple: Complementary learners for real-time tracking

L Bertinetto, J Valmadre, S Golodetz… - Proceedings of the …, 2016 - openaccess.thecvf.com
Correlation Filter-based trackers have recently achieved excellent performance, showing
great robustness to challenging situations exhibiting motion blur and illumination changes …

ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks

W Li, H Song - IEEE transactions on intelligent transportation …, 2015 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) have the potential to transform the way people travel
through the creation of a safe interoperable wireless communications network that includes …

Hierarchical incentive mechanism design for federated machine learning in mobile networks

WYB Lim, Z Xiong, C Miao, D Niyato… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
In recent years, the enhanced sensing and computation capabilities of Internet-of-Things
(IoT) devices have opened the doors to several mobile crowdsensing applications. In mobile …

Twenty security considerations for cloud-supported Internet of Things

J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …

Trust management system design for the Internet of Things: A context-aware and multi-service approach

YB Saied, A Olivereau, D Zeghlache, M Laurent - Computers & Security, 2013 - Elsevier
This work proposes a new trust management system (TMS) for the Internet of Things (IoT).
The wide majority of these systems are today bound to the assessment of trustworthiness …

A survey on trust management for mobile ad hoc networks

JH Cho, A Swami, R Chen - IEEE communications surveys & …, 2010 - ieeexplore.ieee.org
Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when
collaboration or cooperation is critical to achieving mission and system goals such as …

Reputation-based framework for high integrity sensor networks

S Ganeriwal, LK Balzano, MB Srivastava - ACM Transactions on Sensor …, 2008 - dl.acm.org
Sensor network technology promises a vast increase in automatic data collection
capabilities through efficient deployment of tiny sensing devices. The technology will allow …

Topology Control in Wireless Ad Hoc and Sensor Networks

P Santi - WILEY google schola, 2005 - Wiley Online Library
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and
sensor networks to reduce energy consumption (which is essential to extend the network …