Improving the security of wireless sensor networks in an IoT environmental monitoring system

M Tellez, S El-Tawab… - 2016 IEEE systems and …, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) has become a popular subject in the technology industry and will
soon reach the popularity level of smartphones. With the rapid technological advancements …

IoT security attacks using reverse engineering methods on WSN applications

M Tellez, S El-Tawab… - 2016 IEEE 3rd World …, 2016 - ieeexplore.ieee.org
With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs)
have become a popular technology for the Internet of Things (IoT). We investigated the …

Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions

C Huth, P Duplys, T Güneysu - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
We are on the brink of a new era, the Internet of Things. Security threats will rise with an
increasing number of devices, since typical sensor nodes refrain from resource intense …

Tinykey: A light-weight architecture for wireless sensor networks securing real-world applications

RD Corin, G Russello… - 2011 Eighth International …, 2011 - ieeexplore.ieee.org
While sharing some commonalities with a canonical computer network, Wireless Sensor
Network (WSN) presents many aspects which are unique. Security mechanisms in a WSN …

Advancing wsn physical security adopting tpm-based architectures

M Barbareschi, E Battista, A Mazzeo… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Cyber Physical Systems typically operate unattended in hostile outdoor environments. A lot
of effort has has been made to protect the communication between sensing nodes and the …

A security model for wireless sensor networks

H Marzi, A Marzi - 2014 IEEE International Conference on …, 2014 - ieeexplore.ieee.org
Until recently use of sensors to collect sensitive parameters had only few risk factors such as
sensor malfunction, uncertainty of data collection, or missing data coverage. Some issues in …

WINSOME: A middleware platform for the provision of secure monitoring services over Wireless Sensor Networks

L Pomante, M Pugliese, S Marchesani… - 2013 9th International …, 2013 - ieeexplore.ieee.org
This paper deals with the design and implementation of security mechanisms in networked
embedded systems (eg Wireless Sensor Networks (WSN)), without the support of external …

Security techniques for the WSN link layer within military IoT

J Furtak, Z Zieliński… - 2016 IEEE 3rd World …, 2016 - ieeexplore.ieee.org
Ensuring security in the military applications of IoT is a big challenge. The main reasons for
this state of affairs is that the sensor nodes of the network are usually mobile, use wireless …

The Monitoring Core: A framework for sensor security application development

M Valero, S Uluagac, S Venkatachalam… - 2012 IEEE 9th …, 2012 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are used for the monitoring of physical and environmental
phenomena, and applicable in a range of different domains (eg, health care, military, critical …

A security architecture and modular intrusion detection system for WSNs

N Aschenbruck, J Bauer, J Bieling… - 2012 Ninth …, 2012 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are deployed in a wide range of application scenarios.
These typically involve monitoring or surveillance of animals or humans, infrastructure, or …