Security threats for time synchronization protocols in the internet of things
Abstract The Internet of Things (IoT) is an emerging field of application includes several
technologies such as the Internet, Wireless Sensor Networks (WSN), Radio Frequency …
technologies such as the Internet, Wireless Sensor Networks (WSN), Radio Frequency …
Nesnelerin İnternetinde Kullanılan Kablosuz Algılayıcı Cihazlar için Bilgi Merkezli Ağ Mimarisinin Uygulanabilirliği Araştırması
Ç Eriş, P Boluk - Avrupa Bilim ve Teknoloji Dergisi, 2021 - dergipark.org.tr
Bilgi merkezli ağlar,(ICN–Information Centric Networks), istemci-sunucu arasında uçtan uca
iletişimin kurulmadığı, kullanıcıların içerik talebini farklı sunuculardan karşılayabildiği bir ağ …
iletişimin kurulmadığı, kullanıcıların içerik talebini farklı sunuculardan karşılayabildiği bir ağ …
A Survey: Authentication Protocols & Security Analysis for Wireless Sensor Networks
Wireless sensor networks (WSNs) are collection of small devices equipped with sensors,
microprocessors, and wireless communication capabilities. These devices are employed for …
microprocessors, and wireless communication capabilities. These devices are employed for …
Wireless Sensor Network Security Analysis for Data and Aggregation
Data security is critical in wireless sensor networks (WSNs) because communication signals
are highly available due to data transmission in free space. Attacks ranging from passive …
are highly available due to data transmission in free space. Attacks ranging from passive …
IoT Attacks Countermeasures: Systematic Review and Future Research Direction
JT Ibibo - International Conference on Big Data Technologies …, 2023 - Springer
In order to connect heterogeneous nodes, objects, and smart devices of a network, such as
e-transportation, e-health, e-education, e-home, and e-grip, the Internet of Things (IoT) has …
e-transportation, e-health, e-education, e-home, and e-grip, the Internet of Things (IoT) has …
An improved blockchain based encryption scheme for secure routing in wireless sensor network using machine learning technique
U Meena, P Sharma - Transactions on Emerging …, 2023 - Wiley Online Library
A secure routing scheme plays an integral role in ensuring the secure routing and efficiency
of wireless sensor networks (WSNs). Recently, many studies have been undertaken to …
of wireless sensor networks (WSNs). Recently, many studies have been undertaken to …
An Analysis of Security Attacks on IoT Applications
K Alkhamisi - International Journal of Information Systems and …, 2023 - journals.cfrit.com
Abstract The Internet of Things (IoT) has emerged as an innovation equipped for interfacing
heterogeneous objects, like individuals, gadgets, and foundation, and simplifying our day-to …
heterogeneous objects, like individuals, gadgets, and foundation, and simplifying our day-to …
Vulnerability Assessment of Industrial and Agricultural Control Systems within the IoT Framework
Industrial Control System (ICS) is a general term that encompasses different types of control
systems, including Supervisory Control and Data Acquisition (SCADA) and Distributed …
systems, including Supervisory Control and Data Acquisition (SCADA) and Distributed …
[PDF][PDF] Design and Analysis of an Automated IoT System for Data Flow Optimization in Higher Education Institutions.
AA Adegbenjo, EE Onuiri, OB Kalesanwo… - Journal Européen des …, 2023 - academia.edu
The transformative capacity of the Internet of Things (IoT) has become evident across
various sectors. Despite its potential, a discernible hesitancy exists in its adoption within …
various sectors. Despite its potential, a discernible hesitancy exists in its adoption within …
[PDF][PDF] ESSD: Energy Saving and Securing Data Algorithm for WSNs Security.
MM Aldaseen, KM Matrouk… - … , Materials & Continua, 2022 - researchgate.net
The Wireless Sensor Networks (WSNs) are characterized by their widespread deployment
due to low cost, but the WSNs are vulnerable to various types of attacks. To defend against …
due to low cost, but the WSNs are vulnerable to various types of attacks. To defend against …