A comprehensive survey of hardware-assisted security: From the edge to the cloud

L Coppolino, S D'Antonio, G Mazzeo, L Romano - Internet of Things, 2019 - Elsevier
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks

OA Khashan, R Ahmad, NM Khafajah - Ad Hoc Networks, 2021 - Elsevier
In wireless sensor networks (WSNs), security, efficiency, and energy consumption are still
major challenges due to its open, large-scale, and resource-constrained nature. The …

A moving target defense approach for protecting resource-constrained distributed devices

V Casola, A De Benedictis… - 2013 IEEE 14th …, 2013 - ieeexplore.ieee.org
Techniques aimed at continuously changing a system's attack surface, usually referred to as
Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks …

A multi-layer moving target defense approach for protecting resource-constrained distributed devices

V Casola, A De Benedictis, M Albanese - Integration of Reusable Systems, 2014 - Springer
Techniques aimed at continuously changing a system's attack surface, usually referred to as
Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks …

A self-managing volatile key scheme for wireless sensor networks

A Laouid, A Dahmani, HR Hassen, A Bounceur… - Journal of Ambient …, 2019 - Springer
The last decade has seen major advances in Wireless Sensor Networks (WSN). The limited
amount of resources in WSNs is the main challenge for securing them. Indeed, sensors are …

Parametric survey on cross-layer design approach for wireless sensor networks

PS Malik, RP Singh, Y Singh, N Mittal - AIP Conference Proceedings, 2023 - pubs.aip.org
The strict boundary of layers in the TCP/IP layer model and OSI model are excellent model
for understanding protocol architectures and have great modularity. However, the …

Energy efficient security solution for attacks on Wireless Sensor Networks

SK Wagle, AA Bazilraj, KP Ray - 2021 2nd International …, 2021 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) are gaining popularity as being the backbone of Cyber
physical systems, IOT and various data acquisition from sensors deployed in remote …

Petri net based evaluation of energy consumption in wireless sensor nodes

M D'Arienzo, M Iacono, S Marrone… - Journal of High Speed …, 2013 - content.iospress.com
Abstract Wireless Sensor Networks have proven their capability to deal with problems where
wide and hardly accessible areas need to be monitored. Among the other systems there are …

On the adoption of fpga for protecting cyber physical infrastructures

M Barbareschi, E Battista… - 2013 Eighth International …, 2013 - ieeexplore.ieee.org
Up to few years ago, FPGAs were not suitable to develop smart sensor systems because of
power consumption and programming effort. Modern technologies and programming …

Siren: a feasible moving target defence framework for securing resource-constrained embedded nodes

E Battista, V Casola, A Mazzeo… - … Journal of Critical …, 2013 - inderscienceonline.com
Embedded nodes are widely used in several application domains thanks to low-costs and
their data acquisition and processing capabilities. In the recent years, particular emphasis …