Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

Node capture attacks in wireless sensor networks: A system theoretic approach

T Bonaci, L Bushnell… - 49th IEEE Conference on …, 2010 - ieeexplore.ieee.org
In this paper we address the problem of physical node capture attacks in wireless sensor
networks and provide a control theoretic framework to model physical node capture, cloned …

Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach

C Lin, G Wu - The Journal of Supercomputing, 2013 - Springer
In the node capture attack, the adversary intelligently captures nodes and extracts the
cryptographic keys from their memories to destroy the security, reliability and confidentiality …

Maximizing destructiveness of node capture attack in wireless sensor networks

C Lin, G Wu, CW Yu, L Yao - The Journal of Supercomputing, 2015 - Springer
As a special kind of attack, node capture attack in wireless sensor networks destroys the
confidentiality and integrity of network traffic by physically capturing sensor nodes and …

A multi objective optimization modeling in WSN for enhancing the attacking efficiency of node capture attack

P Ahlawat, R Bathla - … Journal of System Assurance Engineering and …, 2023 - Springer
Node capture attacks compromise the integrity and confidentiality of networks by capturing
nodes within them and obtaining cryptographic keys through wireless sensor network links …

Enhancing efficiency of node compromise attacks in vehicular ad-hoc networks using connected dominating set

C Lin, G Wu, F Xia, L Yao - Mobile Networks and Applications, 2013 - Springer
In the node compromise attack, the adversary physically captures nodes and extracts the
cryptographic keys from the memories, which destroys the security, reliability and …

Compromising ad-hoc networks by attacking weakly connected dominating set

C Lin, G Wu, K Yim, L Yao, G Hou - 2015 9th International …, 2015 - ieeexplore.ieee.org
As a special kind of attack, the node compromise attack destroy security, reliability and
confidentiality of ad-hoc networks. However, previous research paid little attention on …

Security and Privacy of Biomedical Cyber-Physical Systems

T Bonaci - 2015 - digital.lib.washington.edu
Advances in cyber-physical systems (CPS), machine learning, big data techniques, and in
cloud computing having been enabling ever more data to be collected about systems and …

[PDF][PDF] Matrix based optimal solution for node capture attack to enhance the attacking efficiency of attacker

R Bathla - 2023 - scholar.archive.org
A node capture attack inside a wireless sensor network (WSN) may destroy the network by
capturing sensor nodes and fetching cryptographic keys within the connections. Adversarial …

[PDF][PDF] Enhance the attacking efficiency of the node compromise attack in vehicular Ad-hoc network using connected dominating set

C Lin, G Wu, F Xia, L Yao - Mobile Netw Appl. doi, 2013 - researchgate.net
In the node compromise attack, the adversary physically captures nodes and extracts the
cryptographic keys from the memories, which destroys the security, reliability and …