The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks …
KF Krentz, G Wunder - Proceedings of the 4th International Workshop on …, 2014 - dl.acm.org
6LoWPAN networks are 802.15. 4-based wireless sensor Networks that seamlessly integrate with IPv6 networks using specially designed protocols. Unfortunately, 6LoWPAN …
Das Internet der Dinge (IoT), bei dem Kommunikationsknoten durch eingebettete Kleinstsystemen gebildet werden, gewinnt an wirtschaftlicher Bedeutung. Durch den …
SA Sert, C Fung, R George… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) facilitate efficient data gathering requirements occurring in indoor and outdoor environments. A great deal of WSNs operates by sensing the area-of …
SS Albouq, EM Fredericks - Proceedings of the 6th ACM Symposium on …, 2017 - dl.acm.org
The routing protocol in connected vehicles (CVs) is vulnerable to wormhole attacks where attackers can deceive legitimate nodes and purport them as if they are immediate or close …
X Wang, Y Li, Y Zhao, C Lei, H Zhang, J Zhang - IEEE Access, 2020 - ieeexplore.ieee.org
Physical layer authentication is an important way to ensure the security of optical communication network. We hereby propose a scheme to realize it by measuring the …
H As' adi, A Keshavarz-Haddad… - 2018 15th International …, 2018 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) are a set of mobile wireless nodes that can communicate without the need for an infrastructure. Features of MANETs have made them vulnerable to …
CT Zenger, M Pietersz, C Paar - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Physical Layer Security (PHYSEC) has the potential to offer substantial advantages for key management for small resource-constrained devices. In this paper, we investigate two …
S Jain, JS Baras - MILCOM 2013-2013 IEEE Military …, 2013 - ieeexplore.ieee.org
Establishing trust and security in ad-hoc networks has been a long studied problem. Several methods have been proposed for evaluation and dissemination of trust in such networks …