Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
A survey on trust models in heterogeneous networks
Heterogeneous networks (HetNets) merge different types of networks into an integrated
network system, which has become a hot research area in recent years towards next …
network system, which has become a hot research area in recent years towards next …
ActiveTrust: Secure and trustable routing in wireless sensor networks
Wireless sensor networks (WSNs) are increasingly being deployed in security-critical
applications. Because of their inherent resource-constrained characteristics, they are prone …
applications. Because of their inherent resource-constrained characteristics, they are prone …
A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks
With the wide applications of wireless sensor networks (WSNs) in various fields, such as
environment monitoring, battlefield surveillance, healthcare, and intrusion detection, trust …
environment monitoring, battlefield surveillance, healthcare, and intrusion detection, trust …
Understanding graph-based trust evaluation in online social networks: Methodologies and challenges
Online Social Networks (OSNs) are becoming a popular method of meeting people and
keeping in touch with friends. OSNs resort to trust evaluation models and algorithms to …
keeping in touch with friends. OSNs resort to trust evaluation models and algorithms to …
Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks
P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …
consistently growing, militating an endless arm race between attackers and defenders. In …
An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications
J Duan, D Gao, D Yang, CH Foh… - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
Trust evaluation plays an important role in securing wireless sensor networks (WSNs), which
is one of the most popular network technologies for the Internet of Things (IoT). The …
is one of the most popular network technologies for the Internet of Things (IoT). The …
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
Due to limited computational power and energy resources, aggregation of data from multiple
sensor nodes done at the aggregating node is usually accomplished by simple methods …
sensor nodes done at the aggregating node is usually accomplished by simple methods …
Recommendation based trust model with an effective defence scheme for MANETs
The reliability of delivering packets through multi-hop intermediate nodes is a significant
issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish …
issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish …
[PDF][PDF] Security issues in wireless sensor networks: Attacks and countermeasures
K Chelli - Proceedings of the world congress on engineering, 2015 - iaeng.org
Wireless sensor networks are one of the most exciting and challenging research domains of
our time. They have a great potential to be deployed in wide mission-critical applications …
our time. They have a great potential to be deployed in wide mission-critical applications …