Cyber-Physical Vulnerabilities of Wireless Sensor Networks in Smart Cities

[1]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[2]  Georgios K. Ouzounis,et al.  Smart cities of the future , 2012, The European Physical Journal Special Topics.

[3]  Cornel Klein,et al.  From Smart Homes to Smart Cities: Opportunities and Challenges from an Industrial Perspective , 2008, NEW2AN.

[4]  Nitin H. Vaidya,et al.  When Watchdog Meets Coding , 2009, 2010 Proceedings IEEE INFOCOM.

[5]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[6]  Timo Ojala,et al.  Experiences inside the Ubiquitous Oulu Smart City , 2011, Computer.

[7]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[8]  Jaime Lloret,et al.  Bio-Inspired Mechanisms in Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[9]  Peng Zhou,et al.  Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Yu-Chee Tseng,et al.  Pervasive and Mobile Computing ( ) – Pervasive and Mobile Computing Review from Wireless Sensor Networks towards Cyber Physical Systems , 2022 .

[11]  Jie Shen,et al.  Fault Tolerant Line-Based Barrier Coverage Formation in Mobile Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[12]  James Conrad,et al.  Design considerations for a large-scale wireless sensor network for substation monitoring , 2010, IEEE Local Computer Network Conference.

[13]  Shicong Meng,et al.  Enhanced Monitoring-as-a-Service for Effective Cloud Management , 2013, IEEE Transactions on Computers.

[14]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[15]  Yang Yang,et al.  Research on Smart Substation Equipment Condition Monitoring System Based on Wireless Sensor Networks , 2011 .

[16]  Hermann de Meer,et al.  Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..

[17]  Xuemin Shen,et al.  A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.