The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - Computers & …, 2022 - Elsevier
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …

On securing underwater acoustic networks: A survey

S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

LB Oliveira, DF Aranha, CPL Gouvêa, M Scott… - Computer …, 2011 - Elsevier
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric
cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off …

EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks

KA Shim, YR Lee, CM Park - Ad Hoc Networks, 2013 - Elsevier
In this paper, we propose an efficient identity-based broadcast authentication scheme,
EIBAS, to achieve security requirements in wireless sensor networks. To minimize …

Analysis of security threats, requirements, technologies and standards in wireless sensor networks

J Lopez, R Roman, C Alcaraz - … School on Foundations of Security Analysis …, 2007 - Springer
As sensor networks are more and more being implemented in real world settings, it is
necessary to analyze how the different requirements of these real-world applications can …

Tinypairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks

X Xiong, DS Wong, X Deng - 2010 IEEE Wireless …, 2010 - ieeexplore.ieee.org
Computing Bilinear Pairing on sensor platforms has become an important research topic
since the introduction of pairing-based cryptography to Wireless Sensor Networks (WSNs) …

SecFUN: Security framework for underwater acoustic sensor networks

G Ateniese, A Capossele, P Gjanci… - OCEANS 2015 …, 2015 - ieeexplore.ieee.org
In this paper we introduce SecFUN, a security framework for underwater acoustic sensor
networks (UASNs). Despite the increasing interest on UASNs, solutions to secure protocols …

A survey on cluster-based group key agreement protocols for WSNs

E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …

Security in underwater sensor network

Y Cong, G Yang, Z Wei, W Zhou - … International Conference on …, 2010 - ieeexplore.ieee.org
Underwater wireless sensor network is a novel type of underwater networked system. Due to
the characteristics of UWSN and underwater channel, UWSN are vulnerable to malicious …

End-to-end authentication in under-water sensor networks

E Souza, HC Wong, I Cunha, Í Cunha… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
Under-Water Wireless Sensor Networks (UWSNs) are a particular class of Wireless Sensor
Networks (WSNs) in which sensors are located, as the name suggests, underwater …