Lightweight Sybil attack detection in IoT based on bloom filter and physical unclonable function

C Pu, KKR Choo - computers & security, 2022 - Elsevier
Routing protocols play an important role in the communication and information distribution
within an Internet of Things (IoT) system. RPL is one such popular routing protocol for IoT …

Sybil attack in RPL-based internet of things: analysis and defenses

C Pu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Over the past few years, Internet of Things (IoT) has emerged as a promising paradigm that
connects various physical devices to the Internet, and contributes to the development of …

Jamming-resilient multipath routing protocol for flying ad hoc networks

C Pu - IEEE Access, 2018 - ieeexplore.ieee.org
As a result of the rapid technological advances on electronic, sensors and communication
technologies, and increasingly popular multi-sized unmanned aerial vehicles, also referred …

Psched: A priority-based service scheduling scheme for the Internet of Drones

C Pu, L Carpenter - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
With the continuous miniaturization of sensors and processors and ubiquitous wireless
connectivity, unmanned aerial vehicles (UAVs), also referred to as drones, are finding many …

Ping flood attack pattern recognition using a K-means algorithm in an Internet of Things (IoT) network

D Stiawan, ME Suryani, MY Idris, MN Aldalaien… - IEEE …, 2021 - ieeexplore.ieee.org
Security is the main challenge in Internet of Things (IoT) systems. The devices on the IoT
networks are very heterogeneous, many of them have limited resources, and they are …

Spam DIS attack against routing protocol in the Internet of Things

C Pu - 2019 International Conference on Computing …, 2019 - ieeexplore.ieee.org
A rapidly growing number of various sensors, objects and smart devices that are capable of
communicating with each other without human intervention are leading the emergence of …

Securing low-power blockchain-enabled IoT devices against energy depletion attack

A Alsirhani, MA Khan, A Alomari, S Maryam… - ACM Transactions on …, 2023 - dl.acm.org
Blockchain-enabled Internet of Things (IoT) envisions a world with rapid development and
implementations to change our everyday lives based on smart devices. These devices are …

Drone Helps Privacy: Sky Caching Assisted -Anonymity in Spatial Querying

HNSS Jagarlapudi, S Lim, J Chae… - IEEE Systems …, 2022 - ieeexplore.ieee.org
As wireless and mobile devices are prevalent and resource-rich, users can frequently query
point-of-interests and enjoy diverse location-based services (LBSs) in infrastructure-based …

A stochastic packet forwarding algorithm in flying ad hoc networks: Design, analysis, and evaluation

C Pu, I Ahmed, E Allen, KKR Choo - IEEE Access, 2021 - ieeexplore.ieee.org
Over the past decade, unmanned airborne vehicles (UAVs; widely known as drones) are
quickly being deployed in various civilian as well as military applications. Drones can self …

A Gini index-based countermeasure against sybil attack in the internet of things

B Groves, C Pu - MILCOM 2019-2019 IEEE Military …, 2019 - ieeexplore.ieee.org
As an essential ingredient of Internet of Things (IoT), IPv6-based Low Power and Lossy
Networks (LLNs) largely consisting of various resource-constrained devices are …