Lightweight Sybil attack detection in IoT based on bloom filter and physical unclonable function
Routing protocols play an important role in the communication and information distribution
within an Internet of Things (IoT) system. RPL is one such popular routing protocol for IoT …
within an Internet of Things (IoT) system. RPL is one such popular routing protocol for IoT …
Sybil attack in RPL-based internet of things: analysis and defenses
C Pu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Over the past few years, Internet of Things (IoT) has emerged as a promising paradigm that
connects various physical devices to the Internet, and contributes to the development of …
connects various physical devices to the Internet, and contributes to the development of …
Jamming-resilient multipath routing protocol for flying ad hoc networks
C Pu - IEEE Access, 2018 - ieeexplore.ieee.org
As a result of the rapid technological advances on electronic, sensors and communication
technologies, and increasingly popular multi-sized unmanned aerial vehicles, also referred …
technologies, and increasingly popular multi-sized unmanned aerial vehicles, also referred …
Psched: A priority-based service scheduling scheme for the Internet of Drones
C Pu, L Carpenter - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
With the continuous miniaturization of sensors and processors and ubiquitous wireless
connectivity, unmanned aerial vehicles (UAVs), also referred to as drones, are finding many …
connectivity, unmanned aerial vehicles (UAVs), also referred to as drones, are finding many …
Ping flood attack pattern recognition using a K-means algorithm in an Internet of Things (IoT) network
D Stiawan, ME Suryani, MY Idris, MN Aldalaien… - IEEE …, 2021 - ieeexplore.ieee.org
Security is the main challenge in Internet of Things (IoT) systems. The devices on the IoT
networks are very heterogeneous, many of them have limited resources, and they are …
networks are very heterogeneous, many of them have limited resources, and they are …
Spam DIS attack against routing protocol in the Internet of Things
C Pu - 2019 International Conference on Computing …, 2019 - ieeexplore.ieee.org
A rapidly growing number of various sensors, objects and smart devices that are capable of
communicating with each other without human intervention are leading the emergence of …
communicating with each other without human intervention are leading the emergence of …
Securing low-power blockchain-enabled IoT devices against energy depletion attack
Blockchain-enabled Internet of Things (IoT) envisions a world with rapid development and
implementations to change our everyday lives based on smart devices. These devices are …
implementations to change our everyday lives based on smart devices. These devices are …
Drone Helps Privacy: Sky Caching Assisted -Anonymity in Spatial Querying
As wireless and mobile devices are prevalent and resource-rich, users can frequently query
point-of-interests and enjoy diverse location-based services (LBSs) in infrastructure-based …
point-of-interests and enjoy diverse location-based services (LBSs) in infrastructure-based …
A stochastic packet forwarding algorithm in flying ad hoc networks: Design, analysis, and evaluation
Over the past decade, unmanned airborne vehicles (UAVs; widely known as drones) are
quickly being deployed in various civilian as well as military applications. Drones can self …
quickly being deployed in various civilian as well as military applications. Drones can self …
A Gini index-based countermeasure against sybil attack in the internet of things
B Groves, C Pu - MILCOM 2019-2019 IEEE Military …, 2019 - ieeexplore.ieee.org
As an essential ingredient of Internet of Things (IoT), IPv6-based Low Power and Lossy
Networks (LLNs) largely consisting of various resource-constrained devices are …
Networks (LLNs) largely consisting of various resource-constrained devices are …