Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

MS Yousefpoor, E Yousefpoor, H Barati, A Barati… - Journal of Network and …, 2021 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which monitor an
environment. These networks have many applications in Internet of Things (IoT) and …

Detection of distributed denial of service (DDoS) attacks in IOT based monitoring system of banking sector using machine learning models

U Islam, A Muhammad, R Mansoor, MS Hossain… - Sustainability, 2022 - mdpi.com
Cyberattacks can trigger power outages, military equipment problems, and breaches of
confidential information, ie, medical records could be stolen if they get into the wrong hands …

An adaptive QoS and trust-based lightweight secure routing algorithm for WSNs

A Pathak, I Al-Anbagi… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The limited resources and low computational power of wireless sensor networks (WSNs)
make them vulnerable to various security attacks. Conventional security mechanisms …

A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues

G Sharma, S Vidalis, N Anand, C Menon, S Kumar - Electronics, 2021 - mdpi.com
Security is a mandatory issue in any network, where sensitive data are transferred safely in
the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile …

Comfy smart home using IoT

S Jadon, A Choudhary, H Saini, U Dua… - Proceedings of the …, 2020 - papers.ssrn.com
The evolution of technology has led to automation of the surroundings including home. One
aspect of the technological advancement is that it has promoted the life standards of human …

[PDF][PDF] A review: secure routing protocols for mobile adhoc networks (MANETs)

S Kalime, K Sagar - Journal of Critical Reviews, 2021 - researchgate.net
Mobile Ad-hoc Network is a multi-hop wireless networking of mobile nodes that have
restricted resources by the conditions of battery life, memory, and processing power. The …

Transaction privacy preservations for blockchain technology

B Bhushan, N Sharma - … and Communications: Proceedings of ICICC 2020 …, 2021 - Springer
Blockchain is defined as a technology comprising of logic unit of work done in form of
transactions where any read or write operation can be carried out and stored in form of …

MABPD: Mobile agent-based prevention and black hole attack detection in wireless sensor networks

H Ashraf, F Khan, U Ihsan, F Al-Quayed… - … for Technology and …, 2023 - ieeexplore.ieee.org
With the advancement and availability of the internet in the present age, everything is being
wireless. Be it our home appliances or high defined monitoring systems, Wireless sensor …

Attacks and security measures in wireless sensor network

N Sharma, I Kaushik, VK Agarwal… - … Data Analytics for …, 2021 - Wiley Online Library
Summary Wireless Sensor Network comprises of nodes that are randomly distributed over
the network. This type of network operates over radio wave frequency band. The nodes are …