The limitations in the state-of-the-art counter-measures against the security threats in H-IoT
暂无分享,去创建一个
[1] Thar Baker,et al. A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services , 2020, IEEE Transactions on Industrial Informatics.
[2] Jalel Ben-Othman,et al. QoS enhancement with deep learning-based interference prediction in mobile IoT , 2019, Comput. Commun..
[3] Karl Andersson,et al. A Survey of Blockchain From the Perspectives of Applications, Challenges, and Opportunities , 2019, IEEE Access.
[4] Fadi Al-Turjman,et al. Quantifying Uncertainty in Internet of Medical Things and Big-Data Services Using Intelligence and Deep Learning , 2019, IEEE Access.
[5] Yaser Jararweh,et al. An intrusion detection system for connected vehicles in smart cities , 2019, Ad Hoc Networks.
[6] Moayad Aloqaily,et al. A Blockchain Framework for Securing Connected and Autonomous Vehicles , 2019, Sensors.
[7] Fadi Al-Turjman,et al. Energy monitoring in IoT-based ad hoc networks: An overview , 2019, Comput. Electr. Eng..
[8] Qian He,et al. Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond , 2019, IEEE Network.
[9] Yaser Jararweh,et al. A Mobility Management Architecture for Seamless Delivery of 5G-IoT Services , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[10] Fadi Al-Turjman,et al. Nanosensors for the Internet of Nano-Things (IoNT): An Overview , 2019, Internet of Nano-Things and Wireless Body Area Networks (WBAN).
[11] Fadi Al-Turjman,et al. Energy-Harvesting Methods for WBAN Applications , 2019, Internet of Nano-Things and Wireless Body Area Networks (WBAN).
[12] Fadi Al-Turjman,et al. Internet of Nano-Things (IoNT) & WBAN , 2019, Internet of Nano-Things and Wireless Body Area Networks (WBAN).
[13] Hector Marco-Gisbert,et al. Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack , 2019, Applied Sciences.
[14] Moayad Aloqaily,et al. Reinforcing the Edge: Autonomous Energy Management for Mobile Device Clouds , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[15] Yousaf Bin Zikria,et al. Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution , 2019, Sensors.
[16] Alexandru Lavric,et al. Long Range SigFox Communication Protocol Scalability Analysis Under Large-Scale, High-Density Conditions , 2019, IEEE Access.
[17] Sherali Zeadally,et al. A survey on privacy protection in blockchain system , 2019, J. Netw. Comput. Appl..
[18] Gautam Srivastava,et al. A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.
[19] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[20] Yaser Jararweh,et al. Exploring Computing at the Edge: A Multi-Interface System Architecture Enabled Mobile Device Cloud , 2018, 2018 IEEE 7th International Conference on Cloud Networking (CloudNet).
[21] Rizwan Aslam Butt,et al. Bio‐inspired routing protocol for WSN‐based smart grid applications in the context of Industry 4.0 , 2018, Trans. Emerg. Telecommun. Technol..
[22] Kaiyu Wan,et al. Context-Based Security and Privacy for Healthcare IoT , 2018, 2018 IEEE International Conference on Smart Internet of Things (SmartIoT).
[23] Cong Pu,et al. A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation , 2018, IEEE Systems Journal.
[24] M. Rmayti,et al. Graph-based wormhole attack detection in mobile ad hoc networks (MANETs) , 2018, 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ).
[25] Byung-Seo Kim,et al. Design of MAC Layer Resource Allocation Schemes for IEEE 802.11ax: Future Directions , 2018 .
[26] Bo Cheng,et al. Proactive personalized services through fog-cloud computing in large-scale IoT-based healthcare application , 2017, China Communications.
[27] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[28] Muhammad Nasir Mumtaz Bhutta,et al. Wormhole attack detection in routing protocol for low power lossy networks , 2017, 2017 International Conference on Information and Communication Technologies (ICICT).
[29] Wei Xiang,et al. Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities , 2017, IEEE Access.
[30] Ivana Tomić,et al. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.
[31] Johan Pouwelse,et al. TrustChain: A Sybil-resistant scalable blockchain , 2017, Future Gener. Comput. Syst..
[32] Prachi Shukla,et al. ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things , 2017, 2017 Intelligent Systems Conference (IntelliSys).
[33] Ali Dorri,et al. An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET , 2017, Wirel. Networks.
[34] Mohamad Yusof Darus,et al. Integration of wireless sensor network and Web of Things: Security perspective , 2017, 2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC).
[35] Muhammad Faheem,et al. Capacity and spectrum-aware communication framework for wireless sensor network-based smart grid applications , 2017, Comput. Stand. Interfaces.
[36] Muhammad Faheem,et al. Energy efficient and QoS-aware routing protocol for wireless sensor network-based smart grid applications in the context of industry 4.0 , 2017, Appl. Soft Comput..
[37] Luca Vollero,et al. LoRaWAN as an e-Health Communication Technology , 2017, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).
[38] Leila Ben Saad,et al. An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[39] Sudhir K. Routray,et al. Issues and challenges in healthcare narrowband IoT , 2017, 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT).
[40] Tricha Anjali,et al. Mitigating selective Gray Hole Attack in wireless multi-hop network , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[41] Rupinder Singh,et al. WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks , 2016, Mob. Inf. Syst..
[42] P. Samundiswary,et al. Wireless body area network security issues — Survey , 2016, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[43] Mohammed Feham,et al. Wormhole attack detection in wireless sensor networks , 2016, 2016 SAI Computing Conference (SAI).
[44] Muhammad Faheem,et al. EDHRP: Energy efficient event driven hybrid routing protocol for densely deployed wireless sensor networks , 2015, J. Netw. Comput. Appl..
[45] Mianxiong Dong,et al. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs , 2015, Sensors.
[46] Avijit Mathur,et al. Healthcare WSN: Cluster Elections and Selective Forwarding Defense , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.
[47] Mei-Ju Su,et al. A cloud based Bluetooth Low Energy tracking system for dementia patients , 2015, 2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU).
[48] Tarunpreet Bhatia,et al. Wormhole and Sybil attack in WSN: A review , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).
[49] Andreas M. Antonopoulos,et al. Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .
[50] V. Parthasarathy,et al. A state of the art review on the Internet of Things (IoT) history, technology and fields of deployment , 2014, 2014 International Conference on Science Engineering and Management Research (ICSEMR).
[51] Yi Mu,et al. Securing DSR against wormhole attacks in multirate ad hoc networks , 2013, J. Netw. Comput. Appl..
[52] Rabiah Ahmad,et al. Surveying the Wireless Body Area Network in the realm of wireless communication , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[53] Ali Modirkhazeni,et al. Distributed approach to mitigate wormhole attack in wireless sensor networks , 2011, 7th International Conference on Networked Computing.
[54] Majid Khabbazian,et al. Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks , 2009, IEEE Transactions on Wireless Communications.
[55] Bo Yu,et al. Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[56] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[57] Khaled Salah,et al. Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.
[58] Architectures and Frameworks for Developing and Applying Blockchain Technology , 2019, Advances in Systems Analysis, Software Engineering, and High Performance Computing.
[59] Sanjeev J. Wagh,et al. Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust , 2018, Cluster Computing.
[60] E. Soler,et al. Future Generation Computer Systems , 2018 .
[61] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[62] V. B. Vaghela,et al. Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .
[63] Brijendra Kumar Joshi,et al. A mitigation technique for high transmission power based wormhole attack in Wireless Sensor Networks , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).
[64] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.