Security attacks in IoT: A survey
暂无分享,去创建一个
[1] Imran A. Zualkernan,et al. Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures , 2015 .
[2] Dhananjay Singh,et al. A survey of Internet-of-Things: Future vision, architecture, challenges and services , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[3] R C Thool,et al. UML Modeling of Physical and Data Link Layer Security Attacks in WSN , 2013 .
[4] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[5] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[6] Bruce Schneier,et al. Side channel cryptanalysis of product ciphers , 2000 .
[7] Chonggang Wang,et al. Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks , 2013, Secur. Commun. Networks.
[8] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[9] Aikaterini Mitrokotsa,et al. Classification of RFID Attacks , 2008, IWRT.
[10] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[11] Pragya Jain,et al. Defending against internet worms using honeyfarm , 2012, CUBE.
[12] Hong Li,et al. The Survey of RFID Attacks and Defenses , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
[13] Pankaj Rohatgi,et al. Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.
[14] Xin Zhou,et al. Study on security architecture in the Internet of Things , 2011, Proceedings of 2012 International Conference on Measurement, Information and Control.
[15] Parminder Singh,et al. Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WSNs during Wormhole Attack , 2014 .
[16] Ibrahim Abdullah,et al. Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count , 2015 .
[17] Chonggang Wang,et al. Colluding injected attack in mobile ad-hoc networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[18] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[19] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[20] Udai Pratap Rao,et al. Internet of Things — Architecture, applications, security and other major challenges , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[21] Damon Reed,et al. Applying the OSI Seven Layer Network Model To Information Security , 2004 .
[22] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[23] Pg Student,et al. A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network , 2015 .