Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
Tóm tắt
Từ khóa
Tài liệu tham khảo
2017, CC13×0 CC26×0 SimpleLink™ Wireless MCU Technical Reference Manual
becker, 2017, Intrusion detection system framework for Internet of Things
banks, 2014
nikshepa, 2018, 6LoWPAN—Performance analysis on low power networks, Proc Int Conf Comput Netw Commun Technol (ICCNCT), 15, 145
lu, 2014, Secure and efficient data transmission for cluster-based wireless sensor networks, IEEE Trans Parallel Distrib Syst, 25, 750, 10.1109/TPDS.2013.43
stallings, 2018, Computer Security Principles and Practice Global Edition
al-faruque, 2012, Networking elements as a patch distribution platform for distributed automation and control domains
li, 2017, Securing the Internet of Things
balte, 2015, Security issues in Internet of Things (IoT): A survey, Int J Adv Res Comput Sci Softw Eng, 5, 1
zhang, 2017, Understanding IoT security through the data crystal ball: Where we are now and where we are going to be, arXiv preprint arXiv 1703 10667
sikder, 2018, A survey on sensor-based threats to Internet-of-Things (IoT) devices and applications, arXiv preprint arXiv 1802 02172
osborne, 2018, Meet Torii a New IoT BotNet Far More Sophisticated Than Mirai Variants
friedman, 2018, On the edge Solving the challenges of edge computing in the era of iot
chaudhary, 2017, Privacy and security issues in Internet of Things, International Journal of Educational Research, 3, 2433
apthorpe, 2017, Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic, arXiv preprint arXiv 1708 05044
2018, A Quick History of IoT BotNets
rawat, 2017, Industrial Internet of Things Cybermanufacturing Systems
watteyne, 7554, Using IEEE 802.15.4e time-slotted channel hopping (TSCH) in the Internet of Things (IoT): Problem statement
song, 2016, Cyber-Physical Systems Foundations Principles and Applications
yu, 2006, Detecting selective forwarding attacks in wireless sensor networks, Proc IEEE 20th Int Parallel Distrib Process Symp (IPDPS), 8
li, 2009, Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks, Proc IEEE 6th Int Conf Mobile Adhoc Sens Syst (MASS), 1030
wang, 2003, On supporting distributed collaboration in sensor networks, Proc IEEE Mil Commun Conf (MILCOM), 2, 752
hu, 2003, Rushing attacks and defense in wireless ad hoc network routing protocols, Proc 2nd ACM Workshop Wireless Security, 30, 10.1145/941311.941317
ngai, 2006, On the intruder detection for sinkhole attack in wireless sensor networks, Proc IEEE Int Conf Commun (ICC), 8, 3383
hu, 2004, Using directional antennas to prevent wormhole attacks, Proc NDSS, 241
el kaissi, 2005, DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks
perrey, 2016, TRAIL: Topology Authentication in RPL, Proc Int Conf Embedded Wireless Syst Netw (EWSN), 59
çayirci, 2009, Security attacks in ad hoc, sensor and mesh networks, Security in Wireless Ad Hoc and Sensor Networks, 105, 10.1002/9780470516782.ch8
aura, 2000, DoS-resistant authentication with client puzzles, Proc Int Workshop Security Protocols, 170
znaidi, 2008, An ontology for attacks in wireless sensor networks
da xu, 2014, Internet of Things in industries: A survey, IEEE Trans Ind Informat, 10, 2233, 10.1109/TII.2014.2300753
ye, 2005, Statistical en-route filtering of injected false data in sensor networks, IEEE J Sel Areas Commun, 23, 839, 10.1109/JSAC.2005.843561
butun, 2013, Prevention and detection of intrusions in wireless sensor networks
krishnan, 2016, A QoS parameter based solution for black hole denial of service attack in wireless sensor networks, Indian J of Sci and Technol, 9
karakehayov, 2005, Using reward to detect team black-hole attacks in wireless sensor networks, Proceedings of the workshop on Real-world wireless sensor networks, 20
agah, 2007, Preventing DoS attacks in wireless sensor networks: A repeated game theory approach, Int J Netw Security, 5, 145
chan, 2003, Random key predistribution schemes for sensor networks, Proc IEEE Symp Security Privacy, 197
padmavathi, 2009, A survey of attacks, security mechanisms and challenges in wireless sensor networks, Int J Comput Sci Inf Security, 4, 117
shabana, 2016, Security issues and attacks in wireless sensor networks, Int J Adv Res Comput Sci Electron Eng, 5, 81
bartariya, 2016, Security in wireless sensor networks: Attacks and solutions, Int J Adv Res Comput Commun Eng, 5, 214
sharma, 2010, Wireless sensor networks: An overview on its security threats, Int J Comput Appl, 42
2016
kumar, 2015, Survey of security and privacy issues of Internet of Things, Int J Adv Netw Appl, 6, 2372
hamid, 2006, Routing security in sensor network: Hello flood attack and defense, Proc IEEE ICN, 2
frank, 2011, Constrained Application Protocol (CoAP)