[HTML][HTML] A systematic literature review of blockchain-based applications: Current status, classification and open issues

F Casino, TK Dasaklis, C Patsakis - Telematics and informatics, 2019 - Elsevier
This work provides a systematic literature review of blockchain-based applications across
multiple domains. The aim is to investigate the current state of blockchain technology and its …

A review of industrial wireless networks in the context of Industry 4.0

X Li, D Li, J Wan, AV Vasilakos, CF Lai, S Wang - Wireless networks, 2017 - Springer
There have been many recent advances in wireless communication technologies,
particularly in the area of wireless sensor networks, which have undergone rapid …

Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review

MS Yousefpoor, E Yousefpoor, H Barati, A Barati… - Journal of Network and …, 2021 - Elsevier
Wireless sensor networks include a large number of sensor nodes, which monitor an
environment. These networks have many applications in Internet of Things (IoT) and …

The Internet of Things: a security point of view

S Li, T Tryfonas, H Li - Internet Research, 2016 - emerald.com
Purpose–The purpose of this paper is to provide an in-depth overview of the security
requirements and challenges for Internet of Things (IoT) and discuss security solutions for …

Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory

Z Tian, X Gao, S Su, J Qiu, X Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Conducting reputation management is very important for Internet of vehicles. However, most
of the existing work evaluate the effectiveness of their schemes with settled attacking …

Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures

E Ben Hamida, H Noura, W Znaidi - Electronics, 2015 - mdpi.com
Due to the growing number of vehicles on the roads worldwide, road traffic accidents are
currently recognized as a major public safety problem. In this context, connected vehicles …

A novel support vector machine based intrusion detection system for mobile ad hoc networks

EA Shams, A Rizaner - Wireless Networks, 2018 - Springer
The performance of mobile ad hoc networks (MANETs) is significantly affected by the
malicious nodes. One of the most common attacks in MANETs is denial of service (DoS); a …

A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks

E Yousefpoor, H Barati, A Barati - Peer-to-Peer Networking and …, 2021 - Springer
A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered
in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the …

A survey on intrusion detection and prevention in wireless ad-hoc networks

K Khan, A Mehmood, S Khan, MA Khan, Z Iqbal… - Journal of Systems …, 2020 - Elsevier
Ad hoc networks have been serving us in one way or the other, for two decades, through
their vast variety of applications in majority fields. Due to their features such as hostile …