A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols
暂无分享,去创建一个
[1] Reinhard German,et al. Real-time enabled IEEE 802.15.4 sensor networks in industrial automation , 2009, 2009 IEEE International Symposium on Industrial Embedded Systems.
[2] Levente Buttyán,et al. VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[3] Soma Bandyopadhyay,et al. LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.
[4] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[5] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[6] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[7] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[8] Eric Rescorla,et al. Datagram Transport Layer Security , 2006, RFC.
[9] Alagan Anpalagan,et al. Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring , 2015, Sensors.
[10] Choong Seon Hong,et al. Attack Model and Detection Scheme for Botnet on 6LoWPAN , 2009, APNOMS.
[11] Radha Poovendran,et al. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[12] Friedemann Mattern,et al. From the Internet of Computers to the Internet of Things , 2010, From Active Data Management to Event-Based Systems and More.
[13] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[14] Colin O'Flynn,et al. Message Denial and Alteration on IEEE 802.15.4 Low-Power Radio Networks , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[15] Tian He,et al. SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.
[16] Bin Shen,et al. A Study of MAC Protocols for WBANs , 2009, Sensors.
[17] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[18] Hanno Wirtz,et al. 6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.
[19] Bhaskar Krishnamachari,et al. Trust-based backpressure routing in wireless sensor networks , 2015, Int. J. Sens. Networks.
[20] HyunGon Kim,et al. Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[21] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[22] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.
[23] Herbert J. Mattord,et al. Principles of Information Security, 4th Edition , 2011 .
[24] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[25] Mischa Dohler,et al. A Security Framework for Routing over Low Power and Lossy Networks , 2012 .
[26] Scott F. Midkiff,et al. Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.
[27] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[28] Gregory J. Pottie,et al. Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..
[29] Taeshik Shon,et al. Wormhole attack prevention mechanism for RPL based LLN network , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).
[30] Insup Lee,et al. Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.
[31] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[32] Remi Badonnel,et al. Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks , 2015, Int. J. Netw. Manag..
[33] Philip Levis,et al. Collection tree protocol , 2009, SenSys '09.
[34] Cheng Li,et al. Improvement of approach to detect sinkhole attacks in Wireless Sensor Networks , 2014 .
[35] Adam Dunkels,et al. Powertrace: Network-level Power Profiling for Low-power Wireless Networks , 2011 .
[36] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[37] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[38] Siarhei Kuryla,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[39] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[40] Elisa Bertino,et al. Kinesis: a security incident response and prevention system for wireless sensor networks , 2014, SenSys.
[41] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[42] Ragib Hasan,et al. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.
[43] Bhaskar Krishnamachari,et al. Routing without routes: the backpressure collection protocol , 2010, IPSN '10.
[44] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[45] Joel J. P. C. Rodrigues,et al. A Network Access Control Framework for 6LoWPAN Networks , 2013, Sensors.
[46] Matthias Wahlisch,et al. Topology Authentication in RPL , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[47] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[48] Dae-Man Han,et al. Smart home energy management system using IEEE 802.15.4 and zigbee , 2010, IEEE Transactions on Consumer Electronics.
[49] Jean-Philippe Vasseur,et al. The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams , 2010, RFC.
[50] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[51] Kevin Weekly,et al. Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[52] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[53] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[54] Remi Badonnel,et al. Addressing DODAG inconsistency attacks in RPL networks , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).
[55] Gianluca Dini,et al. On experimentally evaluating the impact of security on IEEE 802.15.4 networks , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[56] Tongtong Li,et al. A power efficient link-layer security protocol (LLSP) for wireless sensor networks , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[57] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[58] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[59] Stephen T. Kent,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[60] Yang Xiao,et al. Security services and enhancements in the IEEE 802.15.4 wireless sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[61] Yalin E. Sagduyu,et al. Securing the Backpressure Algorithm for Wireless Networks , 2017, IEEE Transactions on Mobile Computing.
[62] Petr Hanacek,et al. Simulation and Evaluation of CTP and Secure-CTP Protocols , 2010 .
[63] Karel Heurtefeux,et al. Enhancing RPL Resilience Against Routing Layer Insider Attacks , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.
[64] Christoph Stasch,et al. New Generation Sensor Web Enablement , 2011, Sensors.
[65] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[66] Carsten Bormann,et al. CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.
[67] Gennaro Boggia,et al. Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.