A survey on security and privacy issues of bitcoin

M Conti, ES Kumar, C Lal, S Ruj - … communications surveys & …, 2018 - ieeexplore.ieee.org
Bitcoin is a popular cryptocurrency that records all transactions in a distributed append-only
public ledger called blockchain. The security of Bitcoin heavily relies on the incentive …

Routing attacks and mitigation methods for RPL-based Internet of Things

A Raoof, A Matrawy, CH Lung - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive
environments made the security of these networks a crucial requirement. Routing in many of …

A survey and future directions on clustering: From WSNs to IoT and modern networking paradigms

A Shahraki, A Taherkordi, Ø Haugen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Many Internet of Things (IoT) networks are created as an overlay over traditional ad-hoc
networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over …

Assessment of routing attacks and mitigation techniques with RPL control messages: A survey

AO Bang, UP Rao, P Kaliyar, M Conti - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …

Reliable data dissemination for the Internet of Things using Harris hawks optimization

A Seyfollahi, A Ghaffari - Peer-to-Peer Networking and Applications, 2020 - Springer
Abstract Internet of Things (IoT) entities compile a massive volume of sensing data and
transmit it to the cloud for processing and reasoning. Reliable and secure data aggregation …

Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

S Dalal, UK Lilhore, N Faujdar, S Simaiya… - Journal of Cloud …, 2023 - Springer
Billions of gadgets are already online, making the IoT an essential aspect of daily life.
However, the interconnected nature of IoT devices also leaves them open to cyber threats …

LISA: Lightweight context-aware IoT service architecture

SP Gochhayat, P Kaliyar, M Conti, P Tiwari… - Journal of cleaner …, 2019 - Elsevier
Abstract Internet-of-Things (IoT) promises to provide services to the end users by connecting
physical things around them through Internet. The conventional services build for web are …

Reliable and secure data transfer in IoT networks

SP Gochhayat, C Lal, L Sharma, DP Sharma, D Gupta… - Wireless …, 2020 - Springer
With the rapid technological improvements in mobile devices and their inclusion in Internet
of Things (IoT), secure key management becomes mandatory to ensure security of …

Attestation-enabled secure and scalable routing protocol for IoT networks

M Conti, P Kaliyar, MM Rabbani, S Ranise - Ad Hoc Networks, 2020 - Elsevier
Cybercrime in the past decade has experienced an all-time high due to the inclusion of so-
called smart devices in our daily lives. These tiny devices with brittle security features are …

SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things

M Conti, P Kaliyar, MM Rabbani… - 2018 14th International …, 2018 - ieeexplore.ieee.org
Due to recent notorious security threats, like Mirai-botnet, it is challenging to perform efficient
data communication and routing in low power and lossy networks (LLNs) such as Internet of …