Security vulnerabilities and issues of traditional wireless sensors networks in IoT
K Gopalakrishnan - … of internet of things (IoT) ecosystem: Insight paradigm, 2020 - Springer
… ample security solution for the complete appliance linked to IoT scheme. The overall security
architecture of entire IoT system: Internet of Things is … and respective security requirements, …
architecture of entire IoT system: Internet of Things is … and respective security requirements, …
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
… Internet of Things (IoT), which is considered the future evolution of the Internet. During past
decade WSN and its security … applications of IoT have no novelty right now IoT security is still …
decade WSN and its security … applications of IoT have no novelty right now IoT security is still …
[HTML][HTML] A secure and efficient method to protect communications and energy consumption in IoT wireless sensor networks
… which captures the major constraints of the network in terms of … secure method of key
distribution and management that can be used to ensure the integrity of wireless sensor networks’ …
distribution and management that can be used to ensure the integrity of wireless sensor networks’ …
Non‐zero‐sum game‐based trust model to enhance wireless sensor networks security for IoT applications
… sensor networks (WSNs) security have flourished due to the day-to-day attack challenges,
which are most popular for internet of things (IoT). … the security of WSNs for IoT applications …
which are most popular for internet of things (IoT). … the security of WSNs for IoT applications …
[PDF][PDF] Wireless sensor networks and the internet of things: Do we need a complete integration?
… in the IoT paradigm is wireless sensor networks (WSN). The benefits of connecting both WSN
and other IoT … To assess this statement, we will analyze two sensor network applications: …
and other IoT … To assess this statement, we will analyze two sensor network applications: …
Iot sensor networks security mechanisms/techniques
A Murtala Zungeru, JM Chuma, CK Lebekwe… - … Things Sensor Networks …, 2020 - Springer
… An increase in the number of IoT devices has led to a rise in IoT sensor networks security
challenges and privacy concerns. Among these, IoT devices are prone to data breaches and …
challenges and privacy concerns. Among these, IoT devices are prone to data breaches and …
[HTML][HTML] A review of IoT sensing applications and challenges using RFID and wireless sensor networks
… , and ZigBee and 6LowPan protocols in the network, security, and application layers. A
compilation of the most common technologies found in IoT applications is shown in Table 2. …
compilation of the most common technologies found in IoT applications is shown in Table 2. …
An overview of Wireless Sensor Networks towards internet of things
M Kocakulak, I Butun - 2017 IEEE 7th annual computing and …, 2017 - ieeexplore.ieee.org
… information on application of WSNs and Section7 addresses the challenges of WSNs security
and privacy. Lastly, Section 8 addresses the future trends of WSNs and IoT applications. …
and privacy. Lastly, Section 8 addresses the future trends of WSNs and IoT applications. …
Securing the internet of things and wireless sensor networks via machine learning: A survey
M Mamdouh, MAI Elrukhsi… - … Conference on Computer …, 2018 - ieeexplore.ieee.org
… In this section, we first present a high level classification of the security attacks that target
WSN and IoT systems. Then, we elaborate on the most critical attacks which are tackled by the …
WSN and IoT systems. Then, we elaborate on the most critical attacks which are tackled by the …
A novel three-factor authentication protocol for wireless sensor networks with IoT notion
F Wu, X Li, L Xu, P Vijayakumar… - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
… That is to say, each sensor in one network … sensor networks, which contain sensors with
different capabilities, are commonly deployed in the above environments. As we know, security …
different capabilities, are commonly deployed in the above environments. As we know, security …