Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and ZigBee standards

P Baronti, P Pillai, VWC Chook, S Chessa… - Computer …, 2007 - Elsevier
Wireless sensor networks are an emerging technology for low-cost, unattended monitoring
of a wide range of environments. Their importance has been enforced by the recent delivery …

State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions

RR Krishna, A Priyadarshini, AV Jha, B Appasani… - Sustainability, 2021 - mdpi.com
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects
that are embedded with sensors, software, and other technologies intending to connect and …

Secure and reliable wsn for internet of things: Challenges and enabling technologies

S Lata, S Mehfuz, S Urooj - IEEE Access, 2021 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is an innovative technology with a broad range of
applications and highly attractive benefits, such as low cost of implementation and data …

[PDF][PDF] Wireless sensor networks: An overview on its security threats

K Sharma, MK Ghose - IJCA, Special Issue on “Mobile Ad-hoc Networks …, 2010 - Citeseer
Wireless sensor networks have become a growing area of research and development due to
the tremendous number of applications that can greatly benefit from such systems and has …

Security solutions for wireless sensor networks

A Jain, K Kant, MR Tripathy - 2012 Second International …, 2012 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is a talented technology that shows great assurance for a
variety of ultramodern applications both for mass public and military. The appearance of …

[PDF][PDF] Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection

Y El Mourabit, A Bouirden… - International …, 2015 - pdfs.semanticscholar.org
Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and
characterized by constrained resources, WSN suffers from several attacks, intrusion and …

[PDF][PDF] Wormhole attack in wireless sensor network

RAJ Shree, RA Khan - International Journal of Computer …, 2014 - researchgate.net
In multi hop wireless systems, such as wireless sensor networks, mobile ad hoc network,
security is an important factor. It becomes more critical issue when we transmit important …

Detection of wormhole attacks in wireless sensor network

D Buch, D Jinwala - 2011 - IET
The Wireless Sensor Networks are typically deployed in ubiquitous and pervasive
applications that make them susceptible to various forms of security attacks. In addition, the …

[图书][B] Simulation studies on ZigBee communications for home automation and networking

P Ajgaonkar, L Wang, M Alam - 2010 - ieeexplore.ieee.org
In this paper, ZigBee is used as a communication medium in home automation and
networking. Simulations on Ad hoc On-Demand Distance Vector (AODV) ZigBee routing …