A survey on jamming attacks and countermeasures in WSNs

A Mpitziopoulos, D Gavalas… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Jamming represents the most serious security threat in the field of wireless sensor networks
(WSNs), as it can easily put out of order even WSNs that utilize strong highlayer security …

Denial of service attacks in wireless networks: The case of jammers

K Pelechrinis, M Iliofotou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The shared nature of the medium in wireless networks makes it easy for an adversary to
launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

Secure routing in wireless sensor networks: Attacks and countermeasures

C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …

Ariadne: A secure on-demand routing protocol for ad hoc networks

YC Hu, A Perrig, DB Johnson - Proceedings of the 8th annual …, 2002 - dl.acm.org
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …

Mobile ad hoc networking: imperatives and challenges

I Chlamtac, M Conti, JJN Liu - Ad hoc networks, 2003 - Elsevier
Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise
wireless mobile nodes that can freely and dynamically self-organize into arbitrary and …

The feasibility of launching and detecting jamming attacks in wireless networks

W Xu, W Trappe, Y Zhang, T Wood - … on Mobile ad hoc networking and …, 2005 - dl.acm.org
Wireless networks are built upon a shared medium that makes it easy for adversaries to
launch jamming-style attacks. These attacks can be easily accomplished by an adversary …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Security in mobile ad hoc networks: challenges and solutions

H Yang, H Luo, F Ye, S Lu… - IEEE wireless …, 2004 - ieeexplore.ieee.org
Security has become a primary concern in order to provide protected communication
between mobile nodes in a hostile environment. Unlike the wireline networks, the unique …

Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …