Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and ZigBee standards
Wireless sensor networks are an emerging technology for low-cost, unattended monitoring
of a wide range of environments. Their importance has been enforced by the recent delivery …
of a wide range of environments. Their importance has been enforced by the recent delivery …
State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects
that are embedded with sensors, software, and other technologies intending to connect and …
that are embedded with sensors, software, and other technologies intending to connect and …
Secure and reliable wsn for internet of things: Challenges and enabling technologies
Wireless Sensor Network (WSN) is an innovative technology with a broad range of
applications and highly attractive benefits, such as low cost of implementation and data …
applications and highly attractive benefits, such as low cost of implementation and data …
[PDF][PDF] Wireless sensor networks: An overview on its security threats
Wireless sensor networks have become a growing area of research and development due to
the tremendous number of applications that can greatly benefit from such systems and has …
the tremendous number of applications that can greatly benefit from such systems and has …
Security solutions for wireless sensor networks
A Jain, K Kant, MR Tripathy - 2012 Second International …, 2012 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is a talented technology that shows great assurance for a
variety of ultramodern applications both for mass public and military. The appearance of …
variety of ultramodern applications both for mass public and military. The appearance of …
[PDF][PDF] Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection
Y El Mourabit, A Bouirden… - International …, 2015 - pdfs.semanticscholar.org
Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and
characterized by constrained resources, WSN suffers from several attacks, intrusion and …
characterized by constrained resources, WSN suffers from several attacks, intrusion and …
[PDF][PDF] Wormhole attack in wireless sensor network
In multi hop wireless systems, such as wireless sensor networks, mobile ad hoc network,
security is an important factor. It becomes more critical issue when we transmit important …
security is an important factor. It becomes more critical issue when we transmit important …
[图书][B] Simulation studies on ZigBee communications for home automation and networking
P Ajgaonkar, L Wang, M Alam - 2010 - ieeexplore.ieee.org
In this paper, ZigBee is used as a communication medium in home automation and
networking. Simulations on Ad hoc On-Demand Distance Vector (AODV) ZigBee routing …
networking. Simulations on Ad hoc On-Demand Distance Vector (AODV) ZigBee routing …