Security threats for time synchronization protocols in the internet of things

SK Jha, N Panigrahi, A Gupta - Principles of Internet of Things (IoT) …, 2020 - Springer
Abstract The Internet of Things (IoT) is an emerging field of application includes several
technologies such as the Internet, Wireless Sensor Networks (WSN), Radio Frequency …

Nesnelerin İnternetinde Kullanılan Kablosuz Algılayıcı Cihazlar için Bilgi Merkezli Ağ Mimarisinin Uygulanabilirliği Araştırması

Ç Eriş, P Boluk - Avrupa Bilim ve Teknoloji Dergisi, 2021 - dergipark.org.tr
Bilgi merkezli ağlar,(ICN–Information Centric Networks), istemci-sunucu arasında uçtan uca
iletişimin kurulmadığı, kullanıcıların içerik talebini farklı sunuculardan karşılayabildiği bir ağ …

A Survey: Authentication Protocols & Security Analysis for Wireless Sensor Networks

S Vyas, U Jain, G Ahmed - 2023 14th International Conference …, 2023 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are collection of small devices equipped with sensors,
microprocessors, and wireless communication capabilities. These devices are employed for …

Wireless Sensor Network Security Analysis for Data and Aggregation

M Manoharan, S Babu, R Pitchai - Journal of Interconnection …, 2023 - World Scientific
Data security is critical in wireless sensor networks (WSNs) because communication signals
are highly available due to data transmission in free space. Attacks ranging from passive …

IoT Attacks Countermeasures: Systematic Review and Future Research Direction

JT Ibibo - International Conference on Big Data Technologies …, 2023 - Springer
In order to connect heterogeneous nodes, objects, and smart devices of a network, such as
e-transportation, e-health, e-education, e-home, and e-grip, the Internet of Things (IoT) has …

An improved blockchain based encryption scheme for secure routing in wireless sensor network using machine learning technique

U Meena, P Sharma - Transactions on Emerging …, 2023 - Wiley Online Library
A secure routing scheme plays an integral role in ensuring the secure routing and efficiency
of wireless sensor networks (WSNs). Recently, many studies have been undertaken to …

An Analysis of Security Attacks on IoT Applications

K Alkhamisi - International Journal of Information Systems and …, 2023 - journals.cfrit.com
Abstract The Internet of Things (IoT) has emerged as an innovation equipped for interfacing
heterogeneous objects, like individuals, gadgets, and foundation, and simplifying our day-to …

Vulnerability Assessment of Industrial and Agricultural Control Systems within the IoT Framework

R Caviglia, F Davoli, A Fausto, G Gaggero… - … Computing on IoT 2.0 …, 2024 - taylorfrancis.com
Industrial Control System (ICS) is a general term that encompasses different types of control
systems, including Supervisory Control and Data Acquisition (SCADA) and Distributed …

[PDF][PDF] Design and Analysis of an Automated IoT System for Data Flow Optimization in Higher Education Institutions.

AA Adegbenjo, EE Onuiri, OB Kalesanwo… - Journal Européen des …, 2023 - academia.edu
The transformative capacity of the Internet of Things (IoT) has become evident across
various sectors. Despite its potential, a discernible hesitancy exists in its adoption within …

[PDF][PDF] ESSD: Energy Saving and Securing Data Algorithm for WSNs Security.

MM Aldaseen, KM Matrouk… - … , Materials & Continua, 2022 - researchgate.net
The Wireless Sensor Networks (WSNs) are characterized by their widespread deployment
due to low cost, but the WSNs are vulnerable to various types of attacks. To defend against …