Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

A survey on trust models in heterogeneous networks

J Wang, Z Yan, H Wang, T Li… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Heterogeneous networks (HetNets) merge different types of networks into an integrated
network system, which has become a hot research area in recent years towards next …

ActiveTrust: Secure and trustable routing in wireless sensor networks

Y Liu, M Dong, K Ota, A Liu - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are increasingly being deployed in security-critical
applications. Because of their inherent resource-constrained characteristics, they are prone …

A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks

T Khan, K Singh, M Abdel-Basset, HV Long… - Ieee …, 2019 - ieeexplore.ieee.org
With the wide applications of wireless sensor networks (WSNs) in various fields, such as
environment monitoring, battlefield surveillance, healthcare, and intrusion detection, trust …

Understanding graph-based trust evaluation in online social networks: Methodologies and challenges

W Jiang, G Wang, MZA Bhuiyan, J Wu - Acm Computing Surveys (Csur), 2016 - dl.acm.org
Online Social Networks (OSNs) are becoming a popular method of meeting people and
keeping in touch with friends. OSNs resort to trust evaluation models and algorithms to …

Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications

J Duan, D Gao, D Yang, CH Foh… - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
Trust evaluation plays an important role in securing wireless sensor networks (WSNs), which
is one of the most popular network technologies for the Internet of Things (IoT). The …

Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks

M Rezvani, A Ignjatovic, E Bertino… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Due to limited computational power and energy resources, aggregation of data from multiple
sensor nodes done at the aggregating node is usually accomplished by simple methods …

Recommendation based trust model with an effective defence scheme for MANETs

AM Shabut, KP Dahal, SK Bista… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The reliability of delivering packets through multi-hop intermediate nodes is a significant
issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish …

[PDF][PDF] Security issues in wireless sensor networks: Attacks and countermeasures

K Chelli - Proceedings of the world congress on engineering, 2015 - iaeng.org
Wireless sensor networks are one of the most exciting and challenging research domains of
our time. They have a great potential to be deployed in wide mission-critical applications …