A survey on security and privacy issues of bitcoin
Bitcoin is a popular cryptocurrency that records all transactions in a distributed append-only
public ledger called blockchain. The security of Bitcoin heavily relies on the incentive …
public ledger called blockchain. The security of Bitcoin heavily relies on the incentive …
Routing attacks and mitigation methods for RPL-based Internet of Things
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive
environments made the security of these networks a crucial requirement. Routing in many of …
environments made the security of these networks a crucial requirement. Routing in many of …
A survey and future directions on clustering: From WSNs to IoT and modern networking paradigms
Many Internet of Things (IoT) networks are created as an overlay over traditional ad-hoc
networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over …
networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over …
Assessment of routing attacks and mitigation techniques with RPL control messages: A survey
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …
Reliable data dissemination for the Internet of Things using Harris hawks optimization
A Seyfollahi, A Ghaffari - Peer-to-Peer Networking and Applications, 2020 - Springer
Abstract Internet of Things (IoT) entities compile a massive volume of sensing data and
transmit it to the cloud for processing and reasoning. Reliable and secure data aggregation …
transmit it to the cloud for processing and reasoning. Reliable and secure data aggregation …
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree
Billions of gadgets are already online, making the IoT an essential aspect of daily life.
However, the interconnected nature of IoT devices also leaves them open to cyber threats …
However, the interconnected nature of IoT devices also leaves them open to cyber threats …
LISA: Lightweight context-aware IoT service architecture
Abstract Internet-of-Things (IoT) promises to provide services to the end users by connecting
physical things around them through Internet. The conventional services build for web are …
physical things around them through Internet. The conventional services build for web are …
Reliable and secure data transfer in IoT networks
With the rapid technological improvements in mobile devices and their inclusion in Internet
of Things (IoT), secure key management becomes mandatory to ensure security of …
of Things (IoT), secure key management becomes mandatory to ensure security of …
Attestation-enabled secure and scalable routing protocol for IoT networks
Cybercrime in the past decade has experienced an all-time high due to the inclusion of so-
called smart devices in our daily lives. These tiny devices with brittle security features are …
called smart devices in our daily lives. These tiny devices with brittle security features are …
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things
Due to recent notorious security threats, like Mirai-botnet, it is challenging to perform efficient
data communication and routing in low power and lossy networks (LLNs) such as Internet of …
data communication and routing in low power and lossy networks (LLNs) such as Internet of …